{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T19:07:30Z","timestamp":1743016050510,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_24","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"346-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Inference Leakage Detection for Authorization Policies over RDF Data"],"prefix":"10.1007","author":[{"given":"Tarek","family":"Sayah","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Coquery","sequence":"additional","affiliation":[]},{"given":"Romuald","family":"Thion","sequence":"additional","affiliation":[]},{"given":"Mohand-Sa\u00efd","family":"Hacid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-76298-0_1","volume-title":"The Semantic Web","author":"F Abel","year":"2007","unstructured":"Abel, F., De Coi, J.L., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF stores. In: Aberer, K., et al. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol. 4825, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"24_CR2","volume-title":"Foundations of Databases","author":"S Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Boston (1995). \n                      http:\/\/webdam.inria.fr\/Alice\/"},{"issue":"3","key":"24_CR3","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S0169-023X(02)00126-X","volume":"43","author":"S Barker","year":"2002","unstructured":"Barker, S.: Protecting deductive databases from unauthorized retrieval and update requests. Data Knowl. Eng. 43(3), 293\u2013315 (2002)","journal-title":"Data Knowl. Eng."},{"issue":"2","key":"24_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. Newsl. 4(2), 6\u201311 (2002)","journal-title":"SIGKDD Explor. Newsl."},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-15877-3_12","volume-title":"Future Internet - FIS 2010","author":"G Flouris","year":"2010","unstructured":"Flouris, G., Fundulaki, I., Michou, M., Antoniou, G.: Controlling access to RDF graphs. In: Berre, A.J., G\u00f3mez-P\u00e9rez, A., Tutschku, K., Fensel, D. (eds.) FIS 2010. LNCS, vol. 6369, pp. 107\u2013117. Springer, Heidelberg (2010)"},{"unstructured":"Hayes, P., McBride, B.: RDF semantics. Technical report, W3C (2004)","key":"24_CR6"},{"doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: SACMAT, pp. 121\u2013129. ACM (2006)","key":"24_CR7","DOI":"10.1145\/1133058.1133076"},{"unstructured":"Lopes, N., Kirrane, S., Zimmermann, A., Polleres, A., Mileo, A.: A logic programming approach for access control over RDF. In: ICLP, pp. 381\u2013392 (2012)","key":"24_CR8"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1145\/357162.357169","volume":"4","author":"A Martelli","year":"1982","unstructured":"Martelli, A., Montanari, U.: An efficient unification algorithm. ACM Trans. Program. Lang. Syst. 4, 258\u2013282 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"doi-asserted-by":"crossref","unstructured":"Papakonstantinou, V., Michou, M., Fundulaki, I., Flouris, G., Antoniou, G.: Access control for RDF graphs using abstract models. In: SACMAT, pp. 103\u2013112 (2012)","key":"24_CR10","DOI":"10.1145\/2295136.2295155"},{"issue":"3","key":"24_CR11","doi-asserted-by":"publisher","first-page":"16:1","DOI":"10.1145\/1567274.1567278","volume":"34","author":"J P\u00e9rez","year":"2009","unstructured":"P\u00e9rez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. ACM Trans. Database Syst. 34(3), 16:1\u201316:45 (2009)","journal-title":"ACM Trans. Database Syst."},{"doi-asserted-by":"crossref","unstructured":"Polleres, A.: From SPARQL to rules (and back). In: WWW, pp. 787\u2013796 (2007)","key":"24_CR12","DOI":"10.1145\/1242572.1242679"},{"doi-asserted-by":"crossref","unstructured":"Rachapalli, J., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Towards fine grained RDF access control. In: SACMAT, pp. 165\u2013176. ACM (2014)","key":"24_CR13","DOI":"10.1145\/2613087.2613092"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-35743-5_13","volume-title":"Formal Aspects of Component Software","author":"CDP Kencana Ramli","year":"2012","unstructured":"Kencana Ramli, C.D.P., Nielson, H.R., Nielson, F.: The logic of XACML. In: Arbab, F., \u00d6lveczky, P.C. (eds.) FACS 2011. LNCS, vol. 7253, pp. 205\u2013222. Springer, Heidelberg (2012)"},{"unstructured":"Reddivari, P., Finin, T., Joshi, A.: Policy-based access control for an RDF store. In: Policy Management for the Web workshop, WWW. pp. 78\u201381 (2005)","key":"24_CR15"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:16:03Z","timestamp":1561148163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}