{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T19:40:02Z","timestamp":1749584402415,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319465975"},{"type":"electronic","value":"9783319465982"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46598-2_4","type":"book-chapter","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T22:31:00Z","timestamp":1473978660000},"page":"47-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Access Control Enforcement for Selective Disclosure of Linked Data"],"prefix":"10.1007","author":[{"given":"Tarek","family":"Sayah","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Coquery","sequence":"additional","affiliation":[]},{"given":"Romuald","family":"Thion","sequence":"additional","affiliation":[]},{"given":"Mohand-Sa\u00efd","family":"Hacid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,17]]},"reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-76298-0_1","volume-title":"The Semantic Web","author":"F Abel","year":"2007","unstructured":"Abel, F., Coi, J.L., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF stores. In: Aberer, K., et al. (eds.) ASWC\/ISWC -2007. LNCS, vol. 4825, pp. 1\u201314. Springer, Heidelberg (2007)"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1322432.1322433","volume":"40","author":"R Angles","year":"2008","unstructured":"Angles, R., Guti\u00e9rrez, C.: Survey of graph database models. ACM Comput. Surv. 40(1), 1\u201339 (2008)","journal-title":"ACM Comput. Surv."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Atre, M., Chaoji, V., Zaki, M.J., Hendler, J.A.: Matrix \u201cbit\u201d loaded: a scalable lightweight join query processor for RDF data. In: WWW, pp. 41\u201350 (2010)","DOI":"10.1145\/1772690.1772696"},{"key":"4_CR4","unstructured":"Berners-Lee, T.: Linked data-design issues (2006). https:\/\/www.w3.org\/DesignIssues\/LinkedData.html"},{"issue":"3","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jswis.2009081901","volume":"5","author":"C Bizer","year":"2009","unstructured":"Bizer, C., Heath, T., Berners-Lee, T.: Linked data - the story so far. Int. J. Semantic Web Inf. Syst. 5(3), 1\u201322 (2009)","journal-title":"Int. J. Semantic Web Inf. Syst."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Costabello, L., Villata, S., Delaforge, N., et al.: Linked data access goes mobile: context-aware authorization for graph stores. In: LDOW-5th WWW Workshop (2012)","DOI":"10.3233\/978-1-61499-098-7-282"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-642-15877-3_12","volume-title":"Future Internet - FIS 2010","author":"G Flouris","year":"2010","unstructured":"Flouris, G., Fundulaki, I., Michou, M., Antoniou, G.: Controlling access to RDF graphs. In: Berre, A.J., G\u00f3mez-P\u00e9rez, A., Tutschku, K., Fensel, D. (eds.) FIS 2010. LNCS, vol. 6369, pp. 107\u2013117. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15877-3_12"},{"key":"4_CR8","unstructured":"Hayes, P.J., Patel-Schneider, P.F.: RDF 1.1 semantics. W3C recommendation (2014). http:\/\/www.w3.org\/TR\/rdf11-mt\/"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: SACMAT, pp. 121\u2013129. ACM (2006)","DOI":"10.1145\/1133058.1133076"},{"key":"4_CR10","unstructured":"Lopes, N., Kirrane, S., Zimmermann, A., Polleres, A., Mileo, A.: A logic programming approach for access control over RDF. In: ICLP, pp. 381\u2013392 (2012)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Papakonstantinou, V., Michou, M., Fundulaki, I., Flouris, G., Antoniou, G.: Access control for RDF graphs using abstract models. In: SACMAT, pp. 103\u2013112 (2012)","DOI":"10.1145\/2295136.2295155"},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1567274.1567278","volume":"34","author":"J P\u00e9rez","year":"2009","unstructured":"P\u00e9rez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. ACM Trans. Database Syst. 34(3), 1\u201345 (2009)","journal-title":"ACM Trans. Database Syst."},{"key":"4_CR13","unstructured":"Reddivari, P., Finin, T., Joshi, A.: Policy-based access control for an RDF store. In: WWW, pp. 78\u201381 (2005)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-319-20810-7_24","volume-title":"Data and Applications Security and Privacy XXIX","author":"T Sayah","year":"2015","unstructured":"Sayah, T., Coquery, E., Thion, R., Hacid, M.-S.: Inference leakage detection for authorization policies over RDF data. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 346\u2013361. Springer, Heidelberg (2015). doi: 10.1007\/978-3-319-20810-7_24"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46598-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T19:08:32Z","timestamp":1749582512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46598-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319465975","9783319465982"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46598-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"17 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"STM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Security and Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"stm2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}