{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:59Z","timestamp":1725550019719},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_42","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:35:49Z","timestamp":1268400949000},"page":"363-368","source":"Crossref","is-referenced-by-count":1,"title":["Using Schemas to Simplify Access Control for XML Documents"],"prefix":"10.1007","author":[{"given":"Indrakshi","family":"Ray","sequence":"first","affiliation":[]},{"given":"Marianna","family":"Muller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S., Ferrari, E.: On Specifying Security Policies for Web Documents with an XML-based Language. In: Proceedings of the First ACM Symposium on Access Control Models and Technologies, May 2001, pp. 57\u201365 (2001)","DOI":"10.1145\/373256.373264"},{"key":"42_CR2","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/4236.935172","volume":"5","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: Securing XML Documents with Author-\u03c7. IEEE Internet Computing\u00a05, 21\u2013151 (2001)","journal-title":"IEEE Internet Computing"},{"issue":"3","key":"42_CR3","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1023\/A:1019289831564","volume":"3","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. World Wide Web Journal\u00a03(3), 139\u2013151 (2001)","journal-title":"World Wide Web Journal"},{"issue":"3","key":"42_CR4","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"42_CR5","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transactions on Information and System Security\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Design and Implementation of Access Control Processor for XML Documents. In: Proceedings of the Ninth International World Wide Web Conference (May 2000)","DOI":"10.1016\/S1389-1286(00)00053-0"},{"key":"42_CR7","unstructured":"Gabillon, A., Bruno, E.: Regulating Access to XML Documents. In: Proceedings of the Fifteenth IFIP WG 11.3 Working Conference on Data and Applications Security, Niagara On the Lake, Canada (July 2001)"},{"key":"42_CR8","unstructured":"Yoon, J.P.: Bitmap-based High-speed Access Control for XML Documents. In: Proceedings of the Seventeenth IFIP WG 11.3 Working Conference on Data and Applications Security, Estes Park, CO (August 2003)"},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, X., Park, J., Sandhu, R.: Schema Based XML Security: RBAC Approach. In: Proceedings of the Seventeenth IFIP WG 11.3 Working Conference on Data and Applications Security, Estes Park, CO (August 2003)","DOI":"10.1007\/1-4020-8070-0_24"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:21:54Z","timestamp":1605759714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}