{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:24:20Z","timestamp":1743085460877,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_12","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"188-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Constructing Inference-Proof Belief Mediators"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Cornelia","family":"Tadros","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"12_CR1","unstructured":"Andrighetto, G., Governatori, G., Noriega, P., van der Torre, L.W.N. (eds.): Normative Multi-Agent Systems. Dagstuhl Follow-Ups, vol. 4. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2013)"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/CSF.2012.24","volume-title":"IEEE Computer Security Foundations Symposium - CSF 2012","author":"M Balliu","year":"2012","unstructured":"Balliu, M., Dam, M., Guernic, G.L.: Encover: symbolic exploration for information flow security. In: Chong, S. (ed.) IEEE Computer Security Foundations Symposium - CSF 2012, pp. 30\u201344. IEEE Computer Society, Los Alamitos (2012)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A., Rosenberg, S.: Expressive declassification policies and modular static enforcement. In: IEEE Symposium on Security and Privacy - S & P 2008, pp. 339\u2013353. IEEE Computer Society, Los Alamitos (2008)","DOI":"10.1109\/SP.2008.20"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1504\/IJCSE.2012.046178","volume":"7","author":"J Biskup","year":"2012","unstructured":"Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. Int. J. Comput. Sci. Eng. 7(1), 17\u201337 (2012)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-37134-9_1","volume-title":"Databases in Networked Information Systems","author":"J Biskup","year":"2013","unstructured":"Biskup, J.: Logic-oriented confidentiality policies for controlled interaction execution. In: Madaan, A., Kikuchi, S., Bhalla, S. (eds.) DNIS 2013. LNCS, vol. 7813, pp. 1\u201322. Springer, Heidelberg (2013)"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-3-319-11212-1_10","volume-title":"Computer Security - ESORICS 2014","author":"J Biskup","year":"2014","unstructured":"Biskup, J., Bonatti, P.A., Galdi, C., Sauro, L.: Optimality and complexity of inference-proof data filtering and CQE. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 165\u2013181. Springer, Heidelberg (2014)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-04897-0_3","volume-title":"Engineering Secure Software and Systems","author":"J Biskup","year":"2014","unstructured":"Biskup, J., Tadros, C.: Idea: towards a vision of engineering controlled interaction execution for information services. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS. LNCS, vol. 8364, pp. 35\u201344. Springer, Heidelberg (2014)"},{"issue":"1\u20132","key":"12_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s10472-013-9374-6","volume":"73","author":"J Biskup","year":"2015","unstructured":"Biskup, J., Tadros, C.: Preserving confidentiality while reacting on iterated queries and belief revisions. Ann. Math. Artif. Intell. 73(1\u20132), 75\u2013123 (2015)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10207-007-0037-7","volume":"7","author":"J Biskup","year":"2008","unstructured":"Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199\u2013217 (2008)","journal-title":"Int. J. Inf. Sec."},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-33203-6_1","volume-title":"Web Reasoning and Rule Systems","author":"G Brewka","year":"2012","unstructured":"Brewka, G.: Multi-context systems: specifying the interaction of knowledge bases declaratively. In: Kr\u00f6tzsch, M., Straccia, U. (eds.) RR 2012. LNCS, vol. 7497, pp. 1\u20134. Springer, Heidelberg (2012)"},{"key":"12_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/978-3-319-03542-0_16","volume-title":"Programming Languages and Systems","author":"N Broberg","year":"2013","unstructured":"Broberg, N., van Delft, B., Sands, D.: Paragon for practical programming with information-flow control. In: Shan, C. (ed.) APLAS 2013. LNCS, vol. 8301, pp. 217\u2013232. Springer, Heidelberg (2013)"},{"key":"12_CR12","volume-title":"Principles of Data Integration","author":"A Doan","year":"2012","unstructured":"Doan, A., Halevy, A.Y., Ives, Z.G.: Principles of Data Integration. Morgan Kaufmann, San Francisco (2012)"},{"key":"12_CR13","volume-title":"Patterns of Enterprise Application Architecture","author":"M Fowler","year":"2003","unstructured":"Fowler, M.: Patterns of Enterprise Application Architecture. Pearson, Boston (2003)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., O\u2019Neill, K.R.: Secrecy in multiagent systems. ACM Trans. Inf. Syst. Secur. 12(1), 5.1\u20135.47 (2008)","DOI":"10.1145\/1410234.1410239"},{"volume-title":"Adversarial Reasoning: Computational Approaches to Reading the Opponent\u2019s Mind","year":"2007","key":"12_CR15","unstructured":"Kott, A., McEneaney, W.M. (eds.): Adversarial Reasoning: Computational Approaches to Reading the Opponent\u2019s Mind. Chapman & Hall\/CRC, London (2007)"},{"issue":"5","key":"12_CR16","doi-asserted-by":"crossref","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: dimensions and principles. J. Comput. Secur. 17(5), 517\u2013548 (2009)","journal-title":"J. Comput. Secur."},{"key":"12_CR17","volume-title":"An Introduction to MultiAgent Systems","author":"MJ Wooldridge","year":"2009","unstructured":"Wooldridge, M.J.: An Introduction to MultiAgent Systems, 2nd edn. Wiley, Chichester (2009)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:15:04Z","timestamp":1561148104000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}