{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:21:37Z","timestamp":1725484897139},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677970"},{"type":"electronic","value":"9783540449577"}],"license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44957-4_87","type":"book-chapter","created":{"date-parts":[[2007,6,1]],"date-time":"2007-06-01T05:24:41Z","timestamp":1180675481000},"page":"1300-1314","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Data Protection by Logic Programming"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2000,12,15]]},"reference":[{"key":"87_CR1","unstructured":"Abiteboul, S., Hull, R., and Vianu, V., Foundations of Databases, Addison-Wesley, 1995."},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Apt, K., Blair, H., and Walker, A., Towards a theory of declarative knowledge, in J. Minker (Ed.), Foundations of Deductive Databases and Logic Programming, Morgan-Kaufmann, 1988.","DOI":"10.1016\/B978-0-934613-40-8.50006-3"},{"key":"87_CR3","unstructured":"Barker, S., Security policy specification in logic, International Conference on Artificial Intelligence, 2000."},{"key":"87_CR4","unstructured":"Barker, S., Protecting deductive databases from unauthorized retrievals, To Appear."},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Ferrari, E., and Samarati, P., A temporal access control mechanism for database systems, IEEE Trans. on KDE, 8(1), 1996.","DOI":"10.1109\/69.485637"},{"key":"87_CR6","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1994."},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Chen, W., Swift., T., and Warren, D., Efficient top-down computation of queries under the well-founded semantics, JLP, 24, 1995.","DOI":"10.1016\/0743-1066(94)00028-5"},{"key":"87_CR8","doi-asserted-by":"crossref","unstructured":"Clark, K., Negation as failure, in H. Gallaire and J. Minker(Eds), Logic and Databases, Plenum, 1978.","DOI":"10.1007\/978-1-4684-3384-5_11"},{"key":"87_CR9","unstructured":"Decker, H., and Celma, M., A slick procedure for integrity checking in deductive databases, ICLP, 1994."},{"key":"87_CR10","unstructured":"Eshghi, K., Abductive planning with the event calculus, ICLP, 1988."},{"key":"87_CR11","doi-asserted-by":"crossref","unstructured":"Griffiths, P. P., and Wade, B.W., An authorization mechanism for relational database systems, A CM TODS, 1(3), 1976.","DOI":"10.1145\/320473.320482"},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V., and Bertino, E., A unified framework for enforcing multiple access control policies in Proc. ACM SIGMOD International Conference on Management of Data, 1997.","DOI":"10.1145\/253260.253364"},{"key":"87_CR13","doi-asserted-by":"crossref","unstructured":"Kowalski, R., Database updates in the Event Calculus, JLP, 12, 1992.","DOI":"10.1016\/0743-1066(92)90041-Z"},{"key":"87_CR14","doi-asserted-by":"crossref","unstructured":"Kuhn, D. R., Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems, Proc. 2nd ACM Workshop on Role-Based Access, 1997.","DOI":"10.1145\/266741.266749"},{"key":"87_CR15","doi-asserted-by":"crossref","unstructured":"Kunen, K., Signed data dependencies in logic programs, JLP, 7, 1989.","DOI":"10.1016\/0743-1066(89)90022-8"},{"key":"87_CR16","doi-asserted-by":"crossref","unstructured":"LLoyd, J., Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Sadri, F. and Kowalski, R., Variants of the event calculus, ICLP, 1995.","DOI":"10.7551\/mitpress\/4298.003.0017"},{"key":"87_CR18","doi-asserted-by":"crossref","unstructured":"Sadri, F. and Kowalski, R., A theorem-proving approach to database integrity in Foundations of Deductive Databases and Logic Programming, J. Minker (Ed.), Morgan-Kaufmann, 1988.","DOI":"10.1016\/B978-0-934613-40-8.50013-0"},{"key":"87_CR19","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C., Role-Based access control: a multi-dimensional view, Proc. 10th Annual Computer Security Applications Conf., 1994."},{"key":"87_CR20","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C., Role-Based access control models, IEEE Computer, 1996.","DOI":"10.1109\/2.485845"},{"key":"87_CR21","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao. P., The XSB System, Version 2.0, Programmer\u2019s Manual, 1999."},{"key":"87_CR22","doi-asserted-by":"crossref","unstructured":"Shepherdson, J., Negation as failure, completion and stratification in D. Gabbay et al. (Eds), Handbook of Logic in AI and Logic Programming, Volume 5, Logic Programming, Oxford, 1997.","DOI":"10.1093\/oso\/9780198537922.003.0009"}],"container-title":["Lecture Notes in Computer Science","Computational Logic \u2014 CL 2000"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44957-4_87","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T18:19:42Z","timestamp":1707934782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44957-4_87"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677970","9783540449577"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-44957-4_87","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]},"assertion":[{"value":"15 December 2000","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}