{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:53:20Z","timestamp":1725512000448},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540717027"},{"type":"electronic","value":"9783540717034"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71703-4_84","type":"book-chapter","created":{"date-parts":[[2007,8,2]],"date-time":"2007-08-02T00:31:22Z","timestamp":1186014682000},"page":"949-954","source":"Crossref","is-referenced-by-count":1,"title":["Security-Conscious XML Indexing"],"prefix":"10.1007","author":[{"given":"Yan","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Dongwon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"84_CR1","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. IEEE Trans. on Information and System Security\u00a05(3), 290\u2013331 (2002)","journal-title":"IEEE Trans. on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Cho, S., Amer-Yahia, S., Lakshmanan, L.V.S., Srivastava, D.: Optimizing the Secure Evaluation of Twig Queries. In: VLDB, Hong Kong, China (Aug. 2002)","key":"84_CR2","DOI":"10.1016\/B978-155860869-6\/50050-0"},{"issue":"2","key":"84_CR3","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. IEEE Trans. on Information and System Security\u00a05(2), 169\u2013202 (2002)","journal-title":"IEEE Trans. on Information and System Security"},{"issue":"6","key":"84_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S1389-1286(00)00053-0","volume":"33","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., Samarati, P.: Design and Implementation of an Access Control Processor for XML Documents. Computer Networks\u00a033(6), 59\u201375 (2000)","journal-title":"Computer Networks"},{"doi-asserted-by":"crossref","unstructured":"Jajodia, S., Mukkamala, R., Ray, I.: A Two-tier Coarse Indexing Scheme for MLS Database Systems. In: IFIP WG 11.3 Working Conf. on Data and Applications Security (DBSec), Lake Tahoe, CA (Aug. 1998)","key":"84_CR5","DOI":"10.1007\/978-0-387-35285-5_12"},{"unstructured":"Li, Q., Moon, B.: Indexing and Querying XML Data for Regular Path Expressions. In: VLDB, Roma, Italy (Sep. 2001)","key":"84_CR6"},{"doi-asserted-by":"crossref","unstructured":"Osborn, S.: Mandatory Access Control and Role-Based Access Control Revisited. In: ACM Workshop on Role Based Access Control, Fairfax, VA, pp. 31\u201340 (1997)","key":"84_CR7","DOI":"10.1145\/266741.266751"}],"container-title":["Lecture Notes in Computer Science","Advances in Databases: Concepts, Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71703-4_84.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:54:58Z","timestamp":1619517298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71703-4_84"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540717027","9783540717034"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71703-4_84","relation":{},"subject":[]}}