{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:57:04Z","timestamp":1725566224501},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_18","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"207-218","source":"Crossref","is-referenced-by-count":2,"title":["An XML-Based Approach to Document Flow Verification"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Mella","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Atluri, V., Chun, S.A., Mazzoleni, P.: A Chinese wall security model for decentralized workflow systems. In: Proc. of the 8th ACM conference on Computer and Communications Security, Philadelphia, PA, USA, pp. 48\u201357 (2001)","DOI":"10.1145\/501983.501991"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Correndo, G., Ferrari, E., Mella, G.: An Infrastructure for Managing Secure Update Operations for XML Data. In: Proc. of the 8th ACM Symposium on Access Control Models and Technologiesz, Villa Gallia, Como, Italy, June 2-3 (2003)","DOI":"10.1145\/775412.775426"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security (TISSEC)\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"18_CR4","unstructured":"Bertino, E., Ferrari, E., Mella, G.: A Framework for Distributed and Cooperative Updates of XML Documents. In: Proc. of the 16th Annual IFIP WG 11.3, Working Conference on Data and Application Security, Cambridge, UK, July 2002, pp. 211\u2013227 (2002)"},{"key":"18_CR5","unstructured":"Bertino, E., Ferrari, E., Mella, G.: Flow Policies: Specification and Enforcement. In: Proc. of the Workshop on Information Assurance, WIA2004, yeld in conjunction with the 23rd IEEE International Performance Computing and Communications Conference, Phoenix, Arizona, pp. 14\u201317 (2004)"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Documents. In: Proc. 6th International Conference on Extending Database Technology, Konstanz, Germany, March 2000, pp. 121\u2013135 (2000)","DOI":"10.1007\/3-540-46439-5_8"},{"key":"18_CR7","unstructured":"Geuer Pollmann, C.: The XML Security Page , \n                    \n                      http:\/\/www.nue.et-inf.unisiegen.de\/~geuer-pollmann\/xmlsecurity.html"},{"key":"18_CR8","unstructured":"Security Assertion Markup Language, SAML v1.1 Standard Specification set x: OASIS Standard,September 2 (2003) Available at: \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tchome.php?wgabbrev=security"},{"issue":"1","key":"18_CR9","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1002\/kpm.132","volume":"9","author":"B. Thuraisingham","year":"2002","unstructured":"Thuraisingham, B., Gupta, A., Bertino, E., Ferrari, E.: Collaborative Commerce and Knowledge Management. Knowledge and Process Management\u00a09(1), 43\u201353 (2002)","journal-title":"Knowledge and Process Management"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Winslett, M., Ching, N., Jones, V., Slepchin, I.: Using Digital Credentials on the World Wide Web. Journal of Computer Security\u00a07 (1997)","DOI":"10.3233\/JCS-1997-5307"},{"key":"18_CR11","unstructured":"World Wide Web Consortium. Available at: \n                    \n                      http:\/\/www.w3.org\/"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:26Z","timestamp":1620013946000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}