{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:58:15Z","timestamp":1725832695804},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319261478"},{"type":"electronic","value":"9783319261485"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26148-5_17","type":"book-chapter","created":{"date-parts":[[2015,10,14]],"date-time":"2015-10-14T01:50:57Z","timestamp":1444787457000},"page":"285-302","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Inference Control in Data Integration Systems"],"prefix":"10.1007","author":[{"given":"Mokhtar","family":"Sellami","sequence":"first","affiliation":[]},{"given":"Mohand-Said","family":"Hacid","sequence":"additional","affiliation":[]},{"given":"Mohamed Mohsen","family":"Gammoudi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Hacid, M.-S., Grillo, N.: Effectively and efficiently selecting access control rules on materialized views over relational databases. In: International Database Engineering and Applications Symposium (IDEAS), pp. 225\u2013235 (2010)","DOI":"10.1145\/1866480.1866512"},{"issue":"7","key":"17_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MC.1983.1654444","volume":"16","author":"DE Denning","year":"1983","unstructured":"Denning, D.E., Schlorer, J.: Inference controls for statistical databases. Computer 16(7), 69\u201382 (1983)","journal-title":"Computer"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Assessing query privileges via safe and efficient permission composition. In: ACM Conference on Computer and Communications Security, pp. 311\u2013322 (2008)","DOI":"10.1145\/1455770.1455810"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: A survey. SIGKDD Explor. Newsl. 4(2), 6\u201311 (2002)","journal-title":"SIGKDD Explor. Newsl."},{"key":"17_CR5","volume-title":"Formal Concept Analysis: Mathematical Foundations","author":"B Ganter","year":"1997","unstructured":"Ganter, B., Wille, R.: Formal Concept Analysis: Mathematical Foundations, 1st edn. Springer-Verlag New York Inc., Secaucus (1997)","edition":"1"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: Proceedings of the 1984 IEEE Symposium on Security and Privacy, pp. 75\u201386. IEEE Computer Society (1984)","DOI":"10.1109\/SP.1984.10019"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Haddad, M., Hacid, M.-S., Laurini, R.: Data integration in presence of authorization policies. In: 1th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25\u201327, pp. 92\u201399 (2012)","DOI":"10.1109\/TrustCom.2012.116"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-05813-9_14","volume-title":"Database Systems for Advanced Applications","author":"M Haddad","year":"2014","unstructured":"Haddad, M., Stevovic, J., Chiasera, A., Velegrakis, Y., Hacid, M.-S.: Access control for data integration in presence of data dependencies. In: Bhowmick, S.S., Dyreson, C.E., Jensen, C.S., Lee, M.L., Muliantara, A., Thalheim, B. (eds.) DASFAA 2014, Part II. LNCS, vol. 8422, pp. 203\u2013217. Springer, Heidelberg (2014)"},{"key":"17_CR9","unstructured":"Fellegi, I.P., Phillips, J.L.: Statistical confidentiality: Some theory and application to data dissemination. In: Annals of Economic and Social Measurement, vol. 3(2), pp. 101\u2013112. National Bureau of Economic Research, Inc. (1974)"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1002\/sec.589","volume":"6","author":"C Kumar","year":"2013","unstructured":"Kumar, C., et al.: Designing role-based access control using formal concept analysis. Security and Communication Networks 6(3), 373\u2013383 (2013)","journal-title":"Security and Communication Networks"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Mouliswaran, S.C., Kumar, Ch., Chandrasekar, C., et al.: Modeling chinese wall access control using formal concept analysis. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 811\u2013816. IEEE (2014)","DOI":"10.1109\/IC3I.2014.7019619"},{"key":"17_CR12","unstructured":"Nait-Bahloul, S.: Inference of security policies on materialized views. rapport de master 2 recherche (2009). \n                      http:\/\/liris.cnrs.fr\/~snaitbah\/wiki"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"\u00d6zsu, M.T., Valduriez, P.: Principles of Distributed Database Systems, 3rd edn. Springer (2011)","DOI":"10.1007\/978-1-4419-8834-8"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A.O., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Weikum, G., K\u00f6nig, A.C., De\u00dfloch, S., (eds.) Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13\u201318, pp. 551\u2013562. ACM (2004)","DOI":"10.1145\/1007568.1007631"},{"key":"17_CR15","unstructured":"Rosenthal, A., Sciore, E.: View security as the basis for data warehouse security. In: CAiSE Workshop on Design and Management of Data Warehouses, pp. 5\u20136 (2000)"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Rosenthal, A., Sciore, E.: Administering permissions for distributed data: Factoring and automated inference. In: Proc. of IFIP WG11.3 Conf. (2001)","DOI":"10.1007\/978-0-387-35587-0_7"},{"issue":"1","key":"17_CR17","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/319540.319555","volume":"6","author":"J Schl\u00f6rer","year":"1981","unstructured":"Schl\u00f6rer, J.: Security of statistical databases: Multidimensional transformation. ACM Trans. Database Syst. 6(1), 95\u2013112 (1981)","journal-title":"ACM Trans. Database Syst."},{"key":"17_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-319-10085-2_30","volume-title":"Database and Expert Systems Applications","author":"M Sellami","year":"2014","unstructured":"Sellami, M., Gammoudi, M.M., Hacid, M.S.: Secure data integration: a formal concept analysis based approach. In: Decker, H., Lhotsk\u00e1, L., Link, S., Spies, M., Wagner, R.R. (eds.) DEXA 2014, Part II. LNCS, vol. 8645, pp. 326\u2013333. Springer, Heidelberg (2014)"},{"key":"17_CR19","first-page":"143","volume":"10","author":"\u015a Sobieski","year":"2015","unstructured":"Sobieski, \u015a., Zieli\u0144ski, B.: Modelling role hierarchy structure using the formal concept analysis. Annales UMCS Sectio AI Informatica 10, 143\u2013159 (2015)","journal-title":"Annales UMCS Sectio AI Informatica"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Su, T.-A., \u00d6zsoyoglu, G.: Data dependencies and inference control in multilevel relational database systems. In: Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 27\u201329, pp. 202\u2013211 (1987)","DOI":"10.1109\/SP.1987.10004"},{"key":"17_CR21","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Lattice-based inference control in data cubes. In: Preserving Privacy in On-Line Analytical Processing (OLAP). AIS, pp. 119\u2013145. Springer US (2007)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2015 Conferences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26148-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T01:55:25Z","timestamp":1559267725000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26148-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319261478","9783319261485"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26148-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}