{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:57:43Z","timestamp":1742979463028,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_5","type":"book-chapter","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T21:20:20Z","timestamp":1474406420000},"page":"61-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Controlled Management of Confidentiality-Preserving Relational Interactions"],"prefix":"10.1007","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Ralf","family":"Menzel","sequence":"additional","affiliation":[]},{"given":"Jaouad","family":"Zarouali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"5_CR1","volume-title":"Foundations of Databases","author":"S Abiteboul","year":"1995","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)"},{"issue":"2\/3","key":"5_CR2","first-page":"229","volume":"4","author":"DE Bell","year":"1996","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: A mathematical model, volume II. J. Comput. Secur. 4(2\/3), 229\u2013263 (1996). reprint of MITRE Corporation 1974","journal-title":"J. Comput. Secur."},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1504\/IJCSE.2012.046178","volume":"7","author":"J Biskup","year":"2012","unstructured":"Biskup, J.: Inference-usability confinement by maintaining inference-proof views of an information system. Int. J. Comput. Sci. Eng. 7(1), 17\u201337 (2012)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"2","key":"5_CR4","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"J Biskup","year":"2001","unstructured":"Biskup, J., Bonatti, P.A.: Lying versus refusal for known potential secrets. Data Knowl. Eng. 38(2), 199\u2013222 (2001)","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/s10207-004-0032-1","volume":"3","author":"J Biskup","year":"2004","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation for enforcing confidentiality in complete information systems. Int. J. Inf. Sec. 3(1), 14\u201327 (2004)","journal-title":"Int. J. Inf. Sec."},{"issue":"1\u20132","key":"5_CR6","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10472-007-9070-5","volume":"50","author":"J Biskup","year":"2007","unstructured":"Biskup, J., Bonatti, P.A.: Controlled query evaluation with open queries for a decidable relational submodel. Ann. Math. Artif. Intell. 50(1\u20132), 39\u201377 (2007)","journal-title":"Ann. Math. Artif. Intell."},{"issue":"1","key":"5_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ipl.2007.09.007","volume":"106","author":"J Biskup","year":"2008","unstructured":"Biskup, J., Embley, D.W., Lochner, J.-H.: Reducing inference control to access control for normalized database schemas. Inf. Process. Lett. 106(1), 8\u201312 (2008)","journal-title":"Inf. Process. Lett."},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"487","DOI":"10.3233\/JCS-2011-0420","volume":"19","author":"J Biskup","year":"2011","unstructured":"Biskup, J., Gogolin, C., Seiler, J., Weibert, T.: Inference-proof view update transactions with forwarded refreshments. J. Comput. Secur. 19, 487\u2013529 (2011)","journal-title":"J. Comput. Secur."},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10207-007-0037-7","volume":"7","author":"J Biskup","year":"2008","unstructured":"Biskup, J., Weibert, T.: Keeping secrets in incomplete databases. Int. J. Inf. Sec. 7(3), 199\u2013217 (2008)","journal-title":"Int. J. Inf. Sec."},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"4044","DOI":"10.1016\/j.tcs.2011.04.026","volume":"412","author":"J Biskup","year":"2011","unstructured":"Biskup, J., Wiese, L.: A sound and complete model-generation procedure for consistent and confidentiality-preserving databases. Theor. Comput. Sci. 412, 4044\u20134072 (2011)","journal-title":"Theor. Comput. Sci."},{"key":"5_CR11","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-0-387-27696-0_10","volume-title":"Secure Data Management in Decentralized Systems","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-Anonymity. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, pp. 323\u2013353. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-0-387-27696-0_10"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10207-014-0239-8","volume":"14","author":"E Dolzhenko","year":"2015","unstructured":"Dolzhenko, E., Ligatti, J., Reddy, S.: Modeling runtime enforcement with mandatory results automata. Int. J. Inf. Sec. 14(1), 47\u201360 (2015)","journal-title":"Int. J. Inf. Sec."},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. 4(2), 6\u201311 (2002)","journal-title":"SIGKDD Explor."},{"key":"5_CR14","volume-title":"Introduction to Privacy-Preserving Data Publishing - Concepts and Techniques","author":"BCM Fung","year":"2011","unstructured":"Fung, B.C.M., Wang, K., Fu, A.W.-C., Yu, P.S.: Introduction to Privacy-Preserving Data Publishing - Concepts and Techniques. Chapman & Hall\/CRC, Boca Raton (2011)"},{"issue":"1","key":"5_CR15","doi-asserted-by":"publisher","first-page":"5.1","DOI":"10.1145\/1410234.1410239","volume":"12","author":"JY Halpern","year":"2008","unstructured":"Halpern, J.Y., O\u2019Neill, K.R.: Secrecy in multiagent systems. ACM Trans. Inf. Syst. Secur. 12(1), 5.1\u20135.47 (2008)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"5_CR16","unstructured":"McCune, W.: Prover9 and Mace4. \n                      http:\/\/www.cs.unm.edu\/~mccune\/prover9\/\n                      \n                    , 2005\u20132010"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:30:43Z","timestamp":1558315843000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}