{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T05:24:15Z","timestamp":1750397055436,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030677305"},{"type":"electronic","value":"9783030677312"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-67731-2_38","type":"book-chapter","created":{"date-parts":[[2021,1,20]],"date-time":"2021-01-20T10:07:45Z","timestamp":1611137265000},"page":"519-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Role-Based Access Control on Graph Databases"],"prefix":"10.1007","author":[{"given":"Jacques","family":"Chabin","sequence":"first","affiliation":[]},{"given":"Cristina D. A.","family":"Ciferri","sequence":"additional","affiliation":[]},{"given":"Mirian","family":"Halfeld-Ferrari","sequence":"additional","affiliation":[]},{"given":"Carmem S.","family":"Hara","sequence":"additional","affiliation":[]},{"given":"Raqueline R. M.","family":"Penteado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,11]]},"reference":[{"key":"38_CR1","unstructured":"https:\/\/www.w3.org\/wiki\/LargeTripleStores"},{"key":"38_CR2","unstructured":"https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"38_CR3","volume-title":"Foundations of Databases","author":"S Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley Reading, Boston (1995)"},{"issue":"9","key":"38_CR4","first-page":"2575","volume":"27","author":"N Ammar","year":"2015","unstructured":"Ammar, N., Malik, Z., Bertino, E., Rezgui, A.: XACML policy evaluation with dynamic context handling. IEEE TKDE 27(9), 2575\u20132588 (2015)","journal-title":"IEEE TKDE"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Chabin, J., Gomes Jr., L., Halfeld Ferrari, M.: A context-driven querying system for urban graph analysis. In: IDEAS, pp. 297\u2013301. ACM (2018)","DOI":"10.1145\/3216122.3216148"},{"key":"38_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1007\/978-3-319-73117-9_48","volume-title":"SOFSEM 2018: Theory and Practice of Computer Science","author":"J Chabin","year":"2018","unstructured":"Chabin, J., Halfeld-Ferrari, M., Markhoff, B., Nguyen, T.B.: Validating data from semantic web providers. In: Tjoa, A.M., Bellatreche, L., Biffl, S., van Leeuwen, J., Wiedermann, J. (eds.) SOFSEM 2018. LNCS, vol. 10706, pp. 682\u2013695. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73117-9_48"},{"issue":"3","key":"38_CR7","first-page":"1","volume":"2","author":"P Colombo","year":"2019","unstructured":"Colombo, P., Ferrari, E.: Access control technologies for big data management systems: literature review and future trends. Cybersecurity 2(3), 1\u201313 (2019)","journal-title":"Cybersecurity"},{"key":"38_CR8","unstructured":"Costabello, L., Villata, S., Gandon, F.: Context-aware access control for RDF graph stores. In: Proceeding of the 20th European Conference on Artificial Intelligence (ECAI) (2012)"},{"issue":"1","key":"38_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1121995.1122010","volume":"35","author":"A Deutsch","year":"2006","unstructured":"Deutsch, A., Popa, L., Tannen, V.: Query reformulation with constraints. SIGMOD Rec. 35(1), 65\u201373 (2006)","journal-title":"SIGMOD Rec."},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Fagin, R., Kolaitis, P.G., Miller, R.J., Popa, L.: Data exchange: semantics and query answering. In: Database Theory - ICDT, 9th International Conference, Italy, Proceedings, pp. 207\u2013224 (2003)","DOI":"10.1007\/3-540-36285-1_14"},{"key":"38_CR11","doi-asserted-by":"crossref","unstructured":"Goncalves, M., Vidal, M.E., Endris, K.M.: Pure: a privacy aware rule-based framework over knowledge graphs. In: Proceeding of the 30th International Conference on Database and Expert Systems Applications (DEXA), pp. 205\u2013214 (2019)","DOI":"10.1007\/978-3-030-27615-7_15"},{"key":"38_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-662-54054-1_5","volume-title":"Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX","author":"S Hartmann","year":"2016","unstructured":"Hartmann, S., Ma, H., Vechsamutvaree, P.: Providing ontology-based privacy-aware data access through web services and service composition. In: Hameurlain, A., K\u00fcng, J., Wagner, R., Schewe, K.-D., Bosa, K. (eds.) Transactions on Large-Scale Data- and Knowledge-Centered Systems XXX. LNCS, vol. 10130, pp. 109\u2013131. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-54054-1_5"},{"key":"38_CR13","unstructured":"Jin, Y., Kaja, K.C.: XACML implementation based on graph database. In: Proceeding of the 34th International Conference on Computers and Their Applications, pp. 65\u201374 (2019)"},{"issue":"2","key":"38_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.3233\/SW-160236","volume":"8","author":"S Kirrane","year":"2017","unstructured":"Kirrane, S., Mileo, A., Decker, S.: Access control and the resource description framework: a survey. Semantic Web 8(2), 311\u2013352 (2017)","journal-title":"Semantic Web"},{"key":"38_CR15","unstructured":"Nguyen, T.B.: L\u2019interrogation du web de donn\u00e9es garantissant des r\u00e9ponses valides par rapport \u00e0 des crit\u00e8res donn\u00e9s. (Querying the Web of Data guaranteeing valid answers with respect to given criteria). Ph.D. thesis, University of Orl\u00e9ans, France (2018). https:\/\/tel.archives-ouvertes.fr\/tel-02426935"},{"key":"38_CR16","unstructured":"Onet, A.: The chase procedure and its applications in data exchange. In: Data Exchange, Integration, and Streams, pp. 1\u201337 (2013)"},{"key":"38_CR17","unstructured":"Padia, A., Finin, T., Joshi, A.: Attribute-based fine grained access control for triple stores. In: Proceeding of the Workshop on Society, Privacy and the Semantic Web - Policy and Technology (2015)"},{"key":"38_CR18","doi-asserted-by":"crossref","unstructured":"Penteado, R.R.M., Schroeder, R., Hara, C.S.: Exploring controlled RDF distribution. In: Proceeding of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 160\u2013167 (2016)","DOI":"10.1109\/CloudCom.2016.0038"},{"issue":"2","key":"38_CR19","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"38_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-23135-8_21","volume-title":"Advances in Databases and Information Systems","author":"R Schroeder","year":"2015","unstructured":"Schroeder, R., Hara, C.S.: Partitioning templates for RDF. In: Morzy, T., Valduriez, P., Bellatreche, L. (eds.) ADBIS 2015. LNCS, vol. 9282, pp. 305\u2013319. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23135-8_21"},{"key":"38_CR21","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1109\/ACCESS.2017.2778029","volume":"6","author":"R Stojanov","year":"2018","unstructured":"Stojanov, R., Gramatikov, S., Mishkovski, I., Trajanov, D.: Linked data authorization platform. IEEE Access 6, 1189\u20131213 (2018)","journal-title":"IEEE Access"},{"key":"38_CR22","first-page":"1","volume":"8","author":"R Stojanova","year":"2017","unstructured":"Stojanova, R., Stojanova, S., Jovanovika, M., Zdraveski, V., Trajanov, D.: Ranking semantic web authorization systems. Semantic Web 8, 1\u20135 (2017)","journal-title":"Semantic Web"}],"container-title":["Lecture Notes in Computer Science","SOFSEM 2021: Theory and Practice of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-67731-2_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T15:59:18Z","timestamp":1619279958000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-67731-2_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030677305","9783030677312"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-67731-2_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SOFSEM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Current Trends in Theory and Practice of Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bolzano-Bozen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"47","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sofsem2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sofsem2021.inf.unibz.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"100","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}