{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:14:40Z","timestamp":1725484480686},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441229"},{"type":"electronic","value":"9783540461401"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46140-x_24","type":"book-chapter","created":{"date-parts":[[2007,5,15]],"date-time":"2007-05-15T23:48:50Z","timestamp":1179272930000},"page":"306-319","source":"Crossref","is-referenced-by-count":0,"title":["A Formal Analysis of the Lightweight Directory Access Protocol"],"prefix":"10.1007","author":[{"given":"Fang","family":"Wei","sequence":"first","affiliation":[]},{"given":"Georg","family":"Lausen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"24_CR1","unstructured":"A. Deutsch and V. Tannen. Containment and Integrity Constraints for XPath Fragments. In KRDB, 2001."},{"key":"24_CR2","unstructured":"S. Abiteboul, P. Buneman, and D. Suciu. Data on the web. Morgan Kaufmann, 2000."},{"key":"24_CR3","unstructured":"S. Abiteboul, R. Hull, and V. Vianu. Foundations of Databases. Addison-Wesley Publishing Company, 1995."},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"S. Amer-Yahia, H. Jagadish, L. Lakshmanan, and D. Srivastava. On Boundingschemas for LDAP Directories. Tech. Report, Concordia University, 1999.","DOI":"10.1007\/3-540-46439-5_20"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"E. P. F. Chan. Containment and Minimization of Positive Conjunctive Queries in OODB\u2019s. In PODS\u201992. ACM Press, 1992.","DOI":"10.1145\/137097.137869"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"S. Chaudhuri and M. Y. Vardi. On the Equivalence of Recursive and Nonrecursive Datalog Programs. In PODS\u201992. ACM Press, 1992.","DOI":"10.1145\/137097.137109"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"S. Cluet, O. Kapitskaia, and D. Srivastava. Using LDAP Directory Caches. In PODS\u201999. ACM Press, 1999.","DOI":"10.1145\/303976.304003"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"P. Godfrey, J. Grant, J. Gryz, and J. Minker. Integrity constraints: Semantics and applications. In Jan Chomicki and Gunter Saake, editors, Logics for Databases and Information Systems. Kluwer, 1998.","DOI":"10.1007\/978-1-4615-5643-5_9"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"A. Halevy. Answering Queries Using Views: A Survey. To appear in VLDB Journal, 2001.","DOI":"10.1007\/s007780100054"},{"key":"24_CR10","unstructured":"T. Howes, M. Smith, and G. Good. Understanding and Deploying LDAP Directory Services. Macmillan Technical Publishing, 1999."},{"key":"24_CR11","unstructured":"Innosoft. Innosoft\u2019s Resources for Directory Deployments. http:\/\/www.innosoft.com\/ldap_survey ."},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"H. V. Jagadish, Laks V. S. Lakshmanan, Tova Milo, Divesh Srivastava, and Dimitra Vista. Querying Network Directories. In SIGMOD\u201999. ACM Press, 1999.","DOI":"10.1145\/304182.304194"},{"issue":"1","key":"24_CR13","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1145\/42267.42273","volume":"35","author":"A. Klug","year":"1988","unstructured":"A. Klug. On conjunctive queries containing inequalities. In J. ACM 35:1, pp. 146\u2013160, 1988.","journal-title":"J. ACM"},{"key":"24_CR14","unstructured":"A. Y. Levy and Y. Sagiv. Queries Independent of Updates. In VLDB\u201993, 1993."},{"key":"24_CR15","unstructured":"P. J. Marron and G. Lausen. On Processing XML in LDAP. In Proceedings of the VLDB\u201901, 2001."},{"key":"24_CR16","unstructured":"Y. Papakonstantinou. Query processing in heterogeneous information sources. PhD thesis, Dept. of Computer Science, Stanford University, 1996."},{"key":"24_CR17","unstructured":"J. Shanmugasundaram, K. Tufte, C. Zhang, G. He, D. J. DeWitt, and J. F. Naughton. Relational Databases for Querying XML Documents: Limitations and Opportunities. In VLDB\u201999, 1999."},{"issue":"2","key":"24_CR18","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1147\/sj.392.0360","volume":"39","author":"S. S. B. Shi","year":"2000","unstructured":"S. S. B. Shi, E. Stokes, D. Byrne, C. F. Corn, D. Bachmann, and T. Jones. An enterprise directory solution with DB2. IBM Systems Journal, 39(2):360\u2013383, 2000.","journal-title":"IBM Systems Journal"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"O. Shmueli. Decidability and Expressiveness of Logic Queries. In PODS\u201987. ACM, 1987.","DOI":"10.1145\/28659.28685"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"I. Tatarinov, Zachary Ives, Alon Halevy, and Dan Weld. Updating XML. In Proc. of ACM SIGMOD Conf. on Management of Data, 2001.","DOI":"10.1145\/375663.375720"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"R. van der Meyden. The Complexity of Querying Indefinite Information: Defined Relations. Ph.D thesis, Rutgers University, 1992.","DOI":"10.1145\/137097.137902"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"M. Wahl, T. Howes, and S. Kille. Lightweight Directory Access Protocol (v3). Request for Comments 2251. http:\/\/www3.innosoft.com\/ldapworld\/rfc2251.txt , 1997.","DOI":"10.17487\/rfc2251"},{"key":"24_CR23","unstructured":"F. Wei and G. Lausen. Conjuctive query containment in the presence of disjunctive integrity constraints. Submitted."},{"key":"24_CR24","unstructured":"F. Wei and G. Lausen. Query Containment for Conjunctive Queries and Datalog with Negation. Technical Report. http:\/\/www.informatik.uni-freiburg.de\/fwei\/paper\/containment.ps"},{"issue":"6","key":"24_CR25","first-page":"894","volume":"9","author":"X. Zhang","year":"1997","unstructured":"X. Zhang and Z. Meral \u00d6zsoyoglu. Implication and referential constraints: A new formal reasoning. TKDE, 9(6):894\u2013910, 1997.","journal-title":"TKDE"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling for New Information Systems Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46140-X_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T20:56:43Z","timestamp":1556398603000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46140-X_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441229","9783540461401"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/3-540-46140-x_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]}}}