{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:19:58Z","timestamp":1740028798906,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441267"},{"type":"electronic","value":"9783540461463"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-46146-9_29","type":"book-chapter","created":{"date-parts":[[2010,3,29]],"date-time":"2010-03-29T21:14:30Z","timestamp":1269897270000},"page":"290-299","source":"Crossref","is-referenced-by-count":4,"title":["Translating Access Authorizations for Transformed XML Documents"],"prefix":"10.1007","author":[{"given":"Somchai","family":"Chatvichienchai","sequence":"first","affiliation":[]},{"given":"Mizuho","family":"Iwaihara","sequence":"additional","affiliation":[]},{"given":"Yahiko","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,8,20]]},"reference":[{"key":"29_CR1","unstructured":"AlphaWorks. Data Descriptors by Example, January 8, 2001. http:\/\/www.alphaworks.ibm.com\/tech\/DDbE ."},{"key":"29_CR2","volume-title":"Specifying and Enforcing Access Control Policies for XML Document Sources","author":"E. Bertino","year":"2000","unstructured":"E. Bertino et al., \u201cSpecifying and Enforcing Access Control Policies for XML Document Sources,\u201d World Wide Web, Baltzer Science Publishers, Netherlands, vol. 3, no. 3, 2000."},{"key":"29_CR3","unstructured":"T. Bray et al. \u201cExtensible Markup Language (XML) 1.0 (Second Edition)\u201d. World Wide Web Consortium (W3C). http:\/\/www.w3c.org\/TR\/REC-xml (October 2000)."},{"key":"29_CR4","unstructured":"J. Clark et al. \u201cXML Path Language (XPath) Version 1.0\u201d. World Wide Web Consortium (W3C). http:\/\/www.w3c.org\/TR\/xpath (November 1999)."},{"key":"29_CR5","unstructured":"J. Clark. \u201cXSL Transformations (XSLT) Version 1.0\u201d. World Wide Web Consortium (W3C). http:\/\/www.w3c.org\/TR\/xslt (November 1999)."},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"E. Damiani, et al., Securing XML documents. In Proceedings of the 2000 International Conference on Extending Database Technology (EDBT\u20192000), Germany, March 2000.","DOI":"10.1007\/3-540-46439-5_8"},{"key":"29_CR7","unstructured":"M. H. Kay. SAXON DTDGenerator, http:\/\/users.iclway.co.uk\/mhkay\/saxon\/saxon5-5-1\/dtdgen.html , 13 April 1999."},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"M. Kudo and S. Hada. \u201cXML Document Security based on Provisional Authorization\u201d. Proceedings of the 7th ACM conference on Computer and Communications Security. November 2000, Athens Greece.","DOI":"10.1145\/352600.352613"},{"key":"29_CR9","unstructured":"T. Milo and S. Zohar. Using schema matching to simplify heterogeneous data translation. In VLDB, pages 122\u2013133, 1998."},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"H. Su, H. Kuno, E.A. Rundensteiner, \u201cAutomating the Transformation of XML Documents\u201d Advances in Web-Age Information Management, 2nd International Conference WIDM 2001: 68\u201375, July 9\u201311, 2001.","DOI":"10.1145\/502932.502946"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1145\/383034.383038","volume":"1","author":"M. Yoshikawa","year":"2001","unstructured":"M. Yoshikawa, et al., XRel: \u201cA Path-Based Approach to Storage and Retrieval of XML Documents Using Relational Databases\u201d. ACM Transactions on Internet Technology, Vol. 1, No. 1, pp. 110\u2013141, 2001.","journal-title":"ACM Transactions on Internet Technology"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46146-9_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:19:49Z","timestamp":1739992789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46146-9_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441267","9783540461463"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-46146-9_29","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}