{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:49:15Z","timestamp":1725490155561},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540417682"},{"type":"electronic","value":"9783540452416"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45241-9_9","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T10:24:00Z","timestamp":1188296640000},"page":"123-137","source":"Crossref","is-referenced-by-count":5,"title":["Secure Deductive Databases"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,3,29]]},"reference":[{"key":"9_CR1","unstructured":"Abiteboul, S., Hull, R., and Vianu, V., Foundations of Databases, Addison-Wesley, 1995."},{"key":"9_CR2","unstructured":"Apt, K., and Bezem, M., Acyclic Programs, New Generation Computing, 1990."},{"key":"9_CR3","unstructured":"Barker, S., Security Policy Specification in Logic, ICAI\u20192000, 2000."},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, Springer, 2000.","DOI":"10.1007\/3-540-44957-4_87"},{"key":"9_CR5","unstructured":"Barker, S., TRBACN: A Temporal Authorization Model, To Appear."},{"key":"9_CR6","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/69.390247","volume":"7","author":"P. Bonatti","year":"1995","unstructured":"Bonatti, P., Kraus, S., and Subrahmanian, V., Foundations of Secure Deductive Databases, IEEE Transactions on Knowledge and Data Engineering,7, 3, 1995.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Brass, S., SLDMagic-The Real Magic (With Applications to Web Queries), 1st International Conference on Computational Logic, LNAI 1861, Springer, 2000.","DOI":"10.1007\/3-540-44957-4_71"},{"key":"9_CR8","unstructured":"Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1995."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Chen, W., and Warren, D., Tabled Evaluation with Delaying for General Logic Programs, J. ACM, 43(1), 1996.","DOI":"10.1145\/227595.227597"},{"key":"9_CR10","volume-title":"Logic and Databases","author":"K. Clark","year":"1978","unstructured":"Clark, K., Negation as Failure, in H Gallaire and J. Minker(Eds), Logic and Databases, Plenum, NY, 1978."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Cuppens, F., and Demolombe, R., A Modal Logical Framework for Security Policies, ISMIS\u201997, 1997.","DOI":"10.1007\/3-540-63614-5_56"},{"key":"9_CR12","unstructured":"Decker, H., and Celma, M., A Slick Procedure for Integrity Checking in Deductive Databases, ICLP, 1994."},{"key":"9_CR13","unstructured":"Ferraiolo, D., Cugini, J., and Kuhn, R., Role-Based Access Control (RBAC): Features and Motivations, Proc. of the Annual Computer Security Applications Conf., IEEE Computer Science Press, 1995."},{"key":"9_CR14","unstructured":"Jajodia, S., Samarati, P., and Subrahmanian, V., A Logical Language for Expressing Authorizations, Proc. IEEE Symp. on Security and Privacy, 1997."},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Jamil, H., Belief Reasoning in MLS Deductive Databases, ACM SIGMOD\u201999, 1999.","DOI":"10.1145\/304182.304192"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"LLoyd, J., Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"9_CR17","series-title":"Lect Notes Comput Sci","volume-title":"Logic and Databases: A 20 Year Retrospective","author":"J. Minker","year":"1996","unstructured":"Minker, J., Logic and Databases: A 20 Year Retrospective, 1st International Workshop on Logic in Databases, LNCS 1154, Springer, 1996."},{"key":"9_CR18","unstructured":"Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, 1988."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., and Youman, C., Role-Based Access Control Models, IEEE Computer, 1996.","DOI":"10.1109\/2.485845"},{"key":"9_CR20","unstructured":"Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P., The XSB System, Version 2.0, Programmer\u2019s Manual, 1999."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"VanGelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 1991.","DOI":"10.1145\/116825.116838"},{"key":"9_CR22","unstructured":"Vardi, M., The Complexity of Query Languages, ACM Symp. on the Theory of Computing, May, 1982."}],"container-title":["Lecture Notes in Computer Science","Practical Aspects of Declarative Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45241-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T13:08:31Z","timestamp":1556802511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45241-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540417682","9783540452416"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-45241-9_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]}}}