{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:26:50Z","timestamp":1742387210950},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201113"},{"type":"electronic","value":"9783540398455"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39845-5_7","type":"book-chapter","created":{"date-parts":[[2011,1,27]],"date-time":"2011-01-27T09:12:10Z","timestamp":1296119530000},"page":"66-85","source":"Crossref","is-referenced-by-count":2,"title":["Author-X \u2013 A System for Secure Dissemination and Update of XML Documents"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Carminati","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Mella","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/293910.293151","volume":"23","author":"E. Bertino","year":"1998","unstructured":"Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Transaction on Database Systems, TODS\u00a023(3), 231\u2013285 (1998)","journal-title":"ACM Transaction on Database Systems, TODS"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"unstructured":"Bertino, E., Ferrari, E., Mella, G.: A Framework for Distributed and Cooperative Updates of XML Documents. In: Proc. of the 16th Annual IFIP WG 11.3, Working Conference on Data and Application Security, Cambridge, UK, July 2002, pp. 211\u2013227.","key":"7_CR3"},{"key":"7_CR4","volume-title":"Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002)","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Carminati, B., Ferrari, E.: A Temporal Key Management Scheme for Broadcasting XML Documents. In: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington, ACM Press, New York (November 2002)"},{"unstructured":"The Excelon Home Page, \n                    \n                      http:\/\/www.exceloncorp.com","key":"7_CR5"},{"unstructured":"Geuer Pollmann. C.: The XML Security Page, Available at: \n                    \n                      http:\/\/www.nue.et-inf.uni-siegen.de\/~geuer-pollmann\/xmlsecurity.html","key":"7_CR6"},{"issue":"3","key":"7_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/4236.935172","volume":"5","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: Author-X: a Comprehensive System for Securing XML Documents. IEEE Internet Computing\u00a05(3), 21\u201331 (2001)","journal-title":"IEEE Internet Computing"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S., Ferrari, E.: On Specifying Security Policies for Web Documents with an XML-based Language. In: Proc. of SACMAT 2001, ACM Symposium on Access Control Models and Technologies, Fairfax, VA (May 2001)","key":"7_CR8","DOI":"10.1145\/373256.373264"},{"issue":"1","key":"7_CR9","first-page":"182","volume":"14","author":"W.-G. Tzeng","year":"2002","unstructured":"Tzeng, W.-G.: A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. IEEE TKDE\u00a014(1), 182\u2013188 (2002)","journal-title":"IEEE TKDE"},{"issue":"3","key":"7_CR10","doi-asserted-by":"crossref","first-page":"255","DOI":"10.3233\/JCS-1997-5307","volume":"5","author":"M. Winslett","year":"1997","unstructured":"Winslett, M., Ching, N., Jones, V., Slepchin, I.: Using Digital Credentials on the World Wide Web. Journal of Computer Security\u00a05(3), 255\u2013267 (1997)","journal-title":"Journal of Computer Security"},{"unstructured":"World Wide Web Consortium. Extensible Markup Language (XML) 1.0 (1998), Available at: \n                    \n                      http:\/\/www.w3.org\/TR\/REC-xml","key":"7_CR11"},{"unstructured":"World Wide Web Consortium. XML Signature Syntax and Processing (2002), Available at: \n                    \n                      http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/","key":"7_CR12"},{"unstructured":"World Wide Web Consortium. XML Path Language (Xpath), 1.0, W3C Recommendation (1999), Available at: \n                    \n                      http:\/\/www.w3.org\/TR\/xpath","key":"7_CR13"}],"container-title":["Lecture Notes in Computer Science","Databases in Networked Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39845-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T22:38:17Z","timestamp":1553380697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39845-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201113","9783540398455"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39845-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}