{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:30:50Z","timestamp":1725564650252},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540203612"},{"type":"electronic","value":"9783540397151"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39715-1_3","type":"book-chapter","created":{"date-parts":[[2010,9,3]],"date-time":"2010-09-03T20:33:00Z","timestamp":1283545980000},"page":"35-48","source":"Crossref","is-referenced-by-count":11,"title":["A Rule-Based XML Access Control Model"],"prefix":"10.1007","author":[{"given":"Chutiporn","family":"Anutariya","sequence":"first","affiliation":[]},{"given":"Somchai","family":"Chatvichienchai","sequence":"additional","affiliation":[]},{"given":"Mizuho","family":"Iwiahara","sequence":"additional","affiliation":[]},{"given":"Vilas","family":"Wuwongse","sequence":"additional","affiliation":[]},{"given":"Yahiko","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"3_CR1","first-page":"944","volume":"13","author":"K. Akama","year":"1998","unstructured":"Akama, K., Shimitsu, T., Miyamoto, E.: Solving Problems by Equivalent Transformation of Declarative Programs. Journal of the Japanese Society of Artificial Intelligence\u00a013(6), 944\u2013952 (1998) (in Japanese)","journal-title":"Journal of the Japanese Society of Artificial Intelligence"},{"key":"3_CR2","unstructured":"Anutariya, C., Wuwongse, V., Wattanapailin, V.: An Equivalent-Transformation- Based XML Rule Language. In: Proc. Int\u2019l Workshop Rule Markup Languages for Business Rules in the Semantic Web, Sardinia, Italy (2002)"},{"key":"3_CR3","volume-title":"World Wide Web","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., Castano, S., Ferrari, S., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. In: World Wide Web, vol.\u00a03(3). Baltzer Science Publishers, Netherlands (2000)"},{"key":"3_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/373256.373264","volume-title":"Proc. 6th ACM Symposium on Access control models and technologies","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: On specifying security policies for web documents with an XML-based language. In: Proc. 6th ACM Symposium on Access control models and technologies, pp. 57\u201365. ACM Press, New York (2001)"},{"key":"3_CR5","unstructured":"Brickley, D., Guha, R.V.: RDF Vocabulary Description Language 1.0: RDF Schema. W3C Working Draft (January 2003), \n                  \n                    http:\/\/www.w3.org\/TR\/rdf-schema\/"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transaction on Information and System Security\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transaction on Information and System Security"},{"key":"3_CR7","unstructured":"Godik, S., Moses, T.: XACML 1.0, OASIS Standard (Febraury 18, 2003), \n                  \n                    http:\/\/www.oasis-open.org\/committees\/download.php\/2406\/oasis-xacml-1.0.pdf"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Mass, Y.: Relying Party Credentials Framework. In: Proc. RSA Conference, San Francisco, CA (April 2001)","DOI":"10.1007\/3-540-45353-9_25"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Mass, Y., Mihaeli, J.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In: Proc. IEEE Symposium Security and Privacy, CA (2000)","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proc. 1997 ACM SIGMOD: Int\u2019l Conf. Management of data, Arizona, pp. 474\u2013485 (1997)","DOI":"10.1145\/253260.253364"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: XML Document Security based on Provisional Authorization. In: Proc. 7th ACM Conf. Computer and Communications Security, Greece, pp. 87\u201396 (2000)","DOI":"10.1145\/352600.352613"},{"key":"3_CR12","unstructured":"Lassila, O. and Swick, R.R.: Resource Description Framework (RDF) Model and Syntax Specification. W3C Recommendation (Febraury 1999), \n                  \n                    http:\/\/www.w3.org\/TR\/REC-rdf-syntax\/"},{"key":"3_CR13","unstructured":"OASIS XACML Technical Committee, \n                  \n                    http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1023\/A:1020947122751","volume":"20","author":"W. Wuwongse","year":"2003","unstructured":"Wuwongse, W., Akama, K., Anutariya, C., Nantajeewarawat, E.: A Data Model for XML Databases. J. Intelligent Information Systems\u00a020(1), 63\u201380 (2003)","journal-title":"J. Intelligent Information Systems"},{"issue":"3","key":"3_CR15","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/5254.940027","volume":"16","author":"W. Wuwongse","year":"2001","unstructured":"Wuwongse, W., Anutariya, C., Akama, K., Nantajeewarawat, E.: XML Declarative Description (XDD): A Language for the Semantic Web. IEEE Intelligent Systems\u00a016(3), 54\u201365 (2001)","journal-title":"IEEE Intelligent Systems"}],"container-title":["Lecture Notes in Computer Science","Rules and Rule Markup Languages for the Semantic Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39715-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T16:49:56Z","timestamp":1553014196000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39715-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540203612","9783540397151"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39715-1_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}