{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:40:09Z","timestamp":1746340809993,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112114"},{"type":"electronic","value":"9783319112121"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11212-1_10","type":"book-chapter","created":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T20:36:45Z","timestamp":1408048605000},"page":"165-181","source":"Crossref","is-referenced-by-count":6,"title":["Optimality and Complexity of Inference-Proof Data Filtering and CQE"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Piero A.","family":"Bonatti","sequence":"additional","affiliation":[]},{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Sauro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4) (2010)","DOI":"10.1145\/1749603.1749605"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"J. Biskup","year":"2000","unstructured":"Biskup, J.: For unknown secrecies refusal is better than lying. Data Knowl. Eng.\u00a033(1), 1\u201323 (2000)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"10_CR3","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J. Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng.\u00a038(2), 199\u2013222 (2001)","journal-title":"Data Knowl. Eng."},{"issue":"1-2","key":"10_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1026106029043","volume":"40","author":"J. Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for known policies by combining lying and refusal. Ann. Math. Artif. Intell.\u00a040(1-2), 37\u201362 (2004)","journal-title":"Ann. Math. Artif. Intell."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bonatti, P.A., Sauro, L.: A confidentiality model for ontologies. In: [21], pp. 17\u201332","DOI":"10.1007\/978-3-642-41335-3_2"},{"key":"10_CR6","unstructured":"Grau, B.C., Kharlamov, E., Kostylev, E.V., Zheleznyakov, D.: Controlled query evaluation over OWL 2 RL ontologies. In: [21], pp. 49\u201365"},{"issue":"1","key":"10_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"G.L. Sicherman","year":"1983","unstructured":"Sicherman, G.L., de Jonge, W., van de Riet, R.P.: Answering queries without revealing secrets. ACM Trans. Database Syst.\u00a08(1), 41\u201359 (1983)","journal-title":"ACM Trans. Database Syst."},{"issue":"5","key":"10_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Symposium on Security and Privacy, pp. 11\u201320 (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"10_CR10","unstructured":"Biskup, J.: Security in Computing Systems - Challenges, Approaches and Solutions. Springer (2009)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Lunt, T.F.: Polyinstantiation: An inevitable part of a multilevel world. In: CSFW, pp. 236\u2013238. IEEE Computer Society (1991)","DOI":"10.1109\/CSFW.1991.151597"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/BFb0013905","volume-title":"Computer Security - ESORICS 92","author":"R.S. Sandhu","year":"1992","unstructured":"Sandhu, R.S., Jajodia, S.: Polyinstantation for cover stories. In: Deswarte, Y., Quisquater, J.-J., Eizenberg, G. (eds.) ESORICS 1992. LNCS, vol.\u00a0648, pp. 307\u2013328. Springer, Heidelberg (1992)"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"P.A. Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng.\u00a07(3), 406\u2013422 (1995)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1-2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10472-007-9070-5","volume":"50","author":"J. Biskup","year":"2007","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell.\u00a050(1-2), 39\u201377 (2007)","journal-title":"Ann. Math. Artif. Intell."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Biskup, J., Tadros, C., Wiese, L.: Towards controlled query evaluation for incomplete first-order databases. In: Link, S., Prade, H. (eds.) FoIKS 2010. LNCS, vol.\u00a05956, pp. 230\u2013247. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-11829-6_16"},{"issue":"3","key":"10_CR16","doi-asserted-by":"crossref","first-page":"487","DOI":"10.3233\/JCS-2011-0420","volume":"19","author":"J. Biskup","year":"2011","unstructured":"Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. Journal of Computer Security\u00a019(3), 487\u2013529 (2011)","journal-title":"Journal of Computer Security"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Biskup, J., Hartmann, S., Link, S., Lochner, J.H.: Efficient inference control for open relational queries. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security XXIV. LNCS, vol.\u00a06166, pp. 162\u2013176. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-13739-6_11"},{"key":"10_CR18","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M.R. Garey","year":"1979","unstructured":"Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman & Co., New York (1979)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-04930-9_4","volume-title":"The Semantic Web - ISWC 2009","author":"F. Baader","year":"2009","unstructured":"Baader, F., Knechtel, M., Pe\u00f1aloza, R.: A generic approach for large-scale ontological reasoning in the presence of access restrictions to the ontology\u2019s axioms. In: Bernstein, A., Karger, D.R., Heath, T., Feigenbaum, L., Maynard, D., Motta, E., Thirunarayan, K. (eds.) ISWC 2009. LNCS, vol.\u00a05823, pp. 49\u201364. Springer, Heidelberg (2009)"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-642-15918-3_7","volume-title":"Web Reasoning and Rule Systems","author":"M. Knechtel","year":"2010","unstructured":"Knechtel, M., Stuckenschmidt, H.: Query-based access control for ontologies. In: Hitzler, P., Lukasiewicz, T. (eds.) RR 2010. LNCS, vol.\u00a06333, pp. 73\u201387. Springer, Heidelberg (2010)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"The Semantic Web \u2013 ISWC 2013","year":"2013","unstructured":"Alani, H., et al. (eds.): ISWC 2013, Part I. LNCS, vol.\u00a08218. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2014"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11212-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T06:07:02Z","timestamp":1746338822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11212-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112114","9783319112121"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11212-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}