{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:06:04Z","timestamp":1725483964630},"publisher-location":"Boston, MA","reference-count":32,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387276946"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-27696-0_5","type":"book-chapter","created":{"date-parts":[[2007,5,11]],"date-time":"2007-05-11T03:03:01Z","timestamp":1178852581000},"page":"127-165","source":"Crossref","is-referenced-by-count":0,"title":["Optimizing Tree Pattern Queries over Secure XML Databases"],"prefix":"10.1007","author":[{"given":"Hui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Divesh","family":"Srivastava","sequence":"additional","affiliation":[]},{"given":"Laks V. S.","family":"Lakshmanan","sequence":"additional","affiliation":[]},{"given":"SungRan","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Sihem","family":"Amer-Yahia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Martin Abadi and Bogdan Warinschi. Security analysis of cryptographically controlled access to xml documents. Symposium on Principles of Database Systems(PODS), 2005.","DOI":"10.1145\/1065167.1065182"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwaihara, and Yahiko Kambayashi Vilas Wuwongse. A rule-based xml access control model. International Conference on Rules and Rule Markup Languages for the Semantic Web(RuleML), 2003.","DOI":"10.1007\/978-3-540-39715-1_3"},{"key":"5_CR3","unstructured":"Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Authorx: A java-based system for xml data protection. IFIP Working Conf. Database Security, 2000."},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Elisa Bertino, Silvana Castano, and Elena Ferrari. On specifying security policies for web documents with an xml-based language. ACM Symposium on Access Control Models and Technologies (SACMAT), 2001.","DOI":"10.1145\/373256.373264"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Elisa Bertino, Silvana Castano, and Elena Ferrari. Securing xml documents with author-x. IEEE Internet Computing, 2001.","DOI":"10.1109\/4236.935172"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Controlled access and dissemination of xml documents. Workshop on Web Information and Data Management, 1999.","DOI":"10.1145\/319759.319770"},{"key":"5_CR7","unstructured":"Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Specifying and enforcing access control policies for xml document sources. World Wide Web Journal, 2000."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Elisa Bertino and Elena Ferrari. Secure and selective dissemination of xml documents. ACM Transactions on Information and System Security (TISSEC), 2002.","DOI":"10.1145\/545186.545190"},{"key":"5_CR9","unstructured":"Biomedical database, http:\/\/www.cs.washington.edu\/-research\/xmldatasets\/www\/repository.html."},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Luc Bouganim, Francois Dang Ngoc, and Philippe Pucheral. Client-based access control management for xml documents. Very Large Database (VLDB), 2004.","DOI":"10.1016\/B978-012088469-8\/50011-5"},{"key":"5_CR11","unstructured":"SungRan Cho, Sihem Amer-Yahia, Laks V. S. Lakshmanan, and Divesh Srivastava. Optimizing the secure evaluation of twig queries. Very Large Database (VLDB), 2002."},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Design and implementation of an access control processor for xml documents. Computer Networks, 2000.","DOI":"10.1016\/S1389-1286(00)00053-0"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Securing xml documents. International Conference on Extending Database Technology(EDBT), 2000.","DOI":"10.1007\/3-540-46439-5_8"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Xml access control systems: A component-based approach. Informatica, 2002.","DOI":"10.1007\/0-306-47008-X_4"},{"key":"5_CR15","unstructured":"Wenfei Fan, Chee Yong Chan, and Minos N. Garofalakis. Secure xml querying with security views. Special Interest Group on Management of Data(SIGMOD), 2004."},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Irini Fundulaki and Maarten Marx. Specifying access control policies for xml documents with xpath. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.","DOI":"10.1145\/990036.990046"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Abhilash Gummadi, Jong P. Yoon, Biren Shah, and Vijay Raghavan. A bitmap-based access control for restricted views of xml documents. ACM Workshop on XML Security, 2003.","DOI":"10.1145\/968559.968569"},{"key":"5_CR18","unstructured":"IBM XML generator, http:\/\/www.alphaworks.ibm.com\/tech\/xmlgenerator."},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Michiharu Kudo and Satoshi Hada. Xml document security based on provisional authorization. ACM Conf. Computer and Communications Security, 2000.","DOI":"10.1145\/352600.352613"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Gabriel Kuper, Fabio Massacci, and Nataliya Rassadko. Generalized xml security views. ACM Symposium on Access Control Models and Technologies (SACMAT), 2005.","DOI":"10.1145\/1063979.1063994"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. Qfilter: Fine-grained run-time xml access control via nfa-based query rewriting. Conference on Information and Knowledge Management(CIKM), 2004.","DOI":"10.1145\/1031171.1031273"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Gerome Miklau and Dan Suciu. Containment and equivalence for an xpath fragment. Symposium on Principles of Database Systems(PODS), 2002.","DOI":"10.1145\/543613.543623"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. Very Large Database (VLDB), 2003.","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Makoto Murata, Akihiko Tozawa, and Michiharu Kudo. Xml access control using static analysis. ACM Conference on Computer and Communications Security (CCS), 2003.","DOI":"10.1145\/948109.948122"},{"key":"5_CR25","unstructured":"United States Government Bills, http:\/\/xml.house.gov."},{"key":"5_CR26","unstructured":"Hui Wang, Divesh Srivastava, Laks V.S. Lakshmanan, SungRan Cho, and Sihem Amer-Yahia. Optimizing tree pattern queries over secure xml databases: Full paper. http:\/\/www.cs.ubc.ca\/~hwang\/accesscontrol\/proof.pdf, 2005."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Jingzhu Wang and Sylvia L. Osborn. A role-based approach to access control for xml databases. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.","DOI":"10.1145\/990036.990047"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Peter Wood. Containment for xpath fragments under dtd constraints. International Conference on Database Theory(ICDT), 2003.","DOI":"10.1007\/3-540-36285-1_20"},{"key":"5_CR29","unstructured":"XALAN, http:\/\/xml.apache.org."},{"key":"5_CR30","unstructured":"XMark, http:\/\/monetdb.cwi.nl\/xml\/."},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Ting Yu, Divesh Srivastava, Laks V.S. Lakshmanan, and H. V. Jagadish. A compressed accessibility map for xml. ACM Transactions on Database Systems, 2004.","DOI":"10.1145\/1005566.1005570"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Huaxin Zhang, Ning Zhang, Kenneth Salem, and Donghui Zhuo. Compact access control labeling for efficient secure xml query evaluation. International Workshop on XML Schema and Data Management(XSDM), 2005.","DOI":"10.1109\/ICDE.2005.206"}],"container-title":["Advances in Information Security","Secure Data Management in Decentralized Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-27696-0_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T21:15:51Z","timestamp":1605647751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-27696-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387276946"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-27696-0_5","relation":{},"subject":[]}}