{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:43:54Z","timestamp":1725493434447},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540432203"},{"type":"electronic","value":"9783540457589"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45758-5_4","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T19:32:20Z","timestamp":1193340740000},"page":"49-66","source":"Crossref","is-referenced-by-count":5,"title":["Controlled Query Evaluation for Known Policies by Combining Lying and Refusal"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Piero","family":"Bonatti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,2,5]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying, Data and Knowledge Engineering, 33 (2000), pp. 1\u201323.","journal-title":"Data and Knowledge Engineering"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets, Data and Knowledge Engineering, 38 (2001), pp. 199\u2013222.","journal-title":"Data and Knowledge Engineering"},{"issue":"3","key":"4_CR3","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases, IEEE Transactions on Knowledge and Data Engineering 7,3 (1995), pp. 406\u2013422.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Dawson, S., De Capitani di Vimercati, S., Lincoln, P., Samarati, P.: Minimal data upgrading to prevent inference and association attacks, Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), 1999, pp. 114\u2013125.","DOI":"10.1145\/303976.303988"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, Springer, 1987.","DOI":"10.1007\/978-3-642-83189-8"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Quian, X.: View-based access control with high assurance. Proc. of the 1996 IEEE Symp. on Security and privacy, 1996, pp. 85\u201393.","DOI":"10.1109\/SECPRI.1996.502672"},{"key":"4_CR7","volume-title":"Mathematical Logic","author":"J.R. Shoenfield","year":"1967","unstructured":"Shoenfield, J.R.: Mathematical Logic, Addison-Wesley, Reading etc., 1967."},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets, ACM Transactions on Database Systems 8,1 (1983), pp. 41\u201359.","journal-title":"ACM Transactions on Database Systems"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Stickel, M.E.: Elimination of inference channels by optimal upgrading. In Proc. of the 1994 IEEE Symposium on Security and Privacy, 1994, pp. 168\u2013174.","DOI":"10.1109\/RISP.1994.296583"},{"issue":"4","key":"4_CR10","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/69.109108","volume":"3","author":"T.A. Su","year":"1991","unstructured":"Su, T.A., Ozsoyoglu, G.: Controlling FD and MVD inferences in multilevel relational database systems. IEEE Trans. on Knowledge and Data Engineering, 3(4):474\u2013485, (1991).","journal-title":"IEEE Trans. on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Foundations of Information and Knowledge Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45758-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T14:13:08Z","timestamp":1551017588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45758-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540432203","9783540457589"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-45758-5_4","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}