{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:37Z","timestamp":1725491857327},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540756507"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75651-4_23","type":"book-chapter","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T07:01:07Z","timestamp":1190358067000},"page":"336-351","source":"Crossref","is-referenced-by-count":0,"title":["Fine-Grained Sticky Provenance Architecture for Office Documents"],"prefix":"10.1007","author":[{"given":"Takuya","family":"Mishina","sequence":"first","affiliation":[]},{"given":"Sachiko","family":"Yoshihama","sequence":"additional","affiliation":[]},{"given":"Michiharu","family":"Kudo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997 Rev. 1, MITRE Corporation, (March 1976)","DOI":"10.21236\/ADA023588"},{"key":"23_CR2","unstructured":"Mishina, T., Watanabe, Y., Katsuno, Y., Yoshihama, S.: Semantic fine-grained data provenance tracking (works in progress). In: Proc. of 22nd Annual Computer Security Applications Conference (2006)"},{"key":"23_CR3","unstructured":"Openoffice.org, http:\/\/www.openoffice.org\/"},{"key":"23_CR4","unstructured":"OASIS open document format for office applications (OpenDocument) TC, http:\/\/www.oasis-open.org\/committees\/office\/"},{"key":"23_CR5","unstructured":"Open document format for office applications (OpenDocument) v1.0, 2006.ISO\/IEC 26300 (2006)"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Ferrari, E., Samarati, P., Bertino, E., Jajodia, S.: Providing flexibility in information flow control for object oriented systems. In: Proc. of the 1997 IEEE Symposium on Security and Privacy, pp. 130\u2013140 (1997)","DOI":"10.1109\/SECPRI.1997.601328"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Chong, S., Myers, A.C.: Security policies for downgrading. In: Proc. of the 11th ACM conference on Computer and communications security, pp. 198\u2013209 (2004)","DOI":"10.1145\/1030083.1030110"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-44450-5_6","volume-title":"FST TCS 2000","author":"P. Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Data provenance: Some basic issues. In: Kapoor, S., Prasad, S. (eds.) FST TCS 2000. LNCS, vol.\u00a01974, pp. 87\u201393. Springer, Heidelberg (2000)"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"Y.L. Simmhan","year":"2005","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Record\u00a034, 31\u201336 (2005)","journal-title":"SIGMOD Record"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Karjoth, G., Schunter, M., Waidner, M.: The platform for enterprise privacy practices\u2014privacy enabled management of customer data. In: The 2nd Workshop on Privacy Enhancing Technologies (2002)","DOI":"10.1007\/3-540-36467-6_6"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Mont, M., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: Proc. of the 14th International Workshop on Database and Expert Systems Applications (2003)","DOI":"10.1109\/DEXA.2003.1232051"},{"issue":"5","key":"23_CR12","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Communications of the ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Communications of the ACM"},{"issue":"1","key":"23_CR13","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W. Tolone","year":"2005","unstructured":"Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Computing Surveys\u00a037(1), 29\u201341 (2005)","journal-title":"ACM Computing Surveys"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Bertino, E., Mella, G., Correndo, G., Ferrari, E.: An infrastructure for managing secure update operations on XML data. In: Proc. of the eighth ACM symposium on Access control models and technologies, pp. 110\u2013122 (2003)","DOI":"10.1145\/775412.775426"},{"key":"23_CR15","unstructured":"XML path language (xpath) version 1.0, W3C recommendation 16 november (1999), http:\/\/www.w3.org\/TR\/xpath"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Pan, C.C., Mitra, P., Liu, P.: Semantic access control for information interoperation. In: Proc. of the eleventh ACM symposium on Access control models and technologies, pp. 237\u2013246 (2006)","DOI":"10.1145\/1133058.1133091"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Jin, J., Ahn, G.J.: Role-based access management for ad-hoc collaborative sharing. In: Proc. of the eleventh ACM symposium on Access control models and technologies, pp. 200\u2013209 (2006)","DOI":"10.1145\/1133058.1133086"},{"issue":"4","key":"23_CR18","first-page":"45","volume":"27","author":"W.C. Tan","year":"2004","unstructured":"Tan, W.C.: Research problems in data provenance. IEEE Data Engineering Bulletin\u00a027(4), 45\u201352 (2004)","journal-title":"IEEE Data Engineering Bulletin"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","volume-title":"the 8th International Conference on Database Theory","author":"P. Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, Springer, Heidelberg (2000)"},{"key":"23_CR20","unstructured":"The EU provenance project, http:\/\/twiki.gridprovenance.org\/bin\/view\/Provenance\/"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: Proc. of the 2006 ACM SIGMOD international conference on Management of data, pp. 539\u2013550 (2006)","DOI":"10.1145\/1142473.1142534"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Buneman, P., Chapman, A., Cheney, J., Vansummerenn, S.: A provenance model for manually curated data. In: Proc. of the International Provenance and Annotation Workshop (2006)","DOI":"10.1007\/11890850_17"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a SOA-based provenance system. In: Proc. of the International Provenance and Annotation Workshop (2006)","DOI":"10.1007\/11890850_21"},{"key":"23_CR24","unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (2001)"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical mostly-static information flow control. In: Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"issue":"1","key":"23_CR26","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"23_CR27","unstructured":"Yoshihama, S., Kudoh, M., Oyanagi, K.: Language-based information flow control in dynamic approach. IBM Research Report TR0694, IBM Research (2006)"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Controlled access and dissemination of XML documents. In: Proc. of the 2nd international workshop on Web information and data management, pp. 22\u201327 (1999)","DOI":"10.1145\/319759.319770"},{"key":"23_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, Springer, Heidelberg (2000)"},{"key":"23_CR30","unstructured":"OASIS eXtensible Access Control Markup Language (XACML) TC, http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Mazzoleni, P., Bertino, E., Crispo, B., Sivasubramanian, S.: XACML policy integration algorithms. In: Proc. of the eleventh ACM symposium on Access control models and technologies, pp. 219\u2013227 (2006)","DOI":"10.1145\/1133058.1133089"},{"key":"23_CR32","series-title":"Lecture Notes in Computer Science","volume-title":"Proc. of Database and Expert Systems Applications","author":"S. Chatvichienchai","year":"2004","unstructured":"Chatvichienchai, S., Anutariya, C., Iwaihara, M., Wuwongse, V., Kambayashi, Y.: Towards integration of XML document access and version control. In: Galindo, F., Takizawa, M., Traunm\u00fcller, R. (eds.) DEXA 2004. LNCS, vol.\u00a03180, Springer, Heidelberg (2004)"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Chatvichienchai, S., Iwaihara, M.: Detecting information leakage in updating XML documents of fine-grained access control. In: Proc. of Database and Expert Systems Applications, pp. 286\u2013296 (2006)","DOI":"10.1007\/11827405_28"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Iwaihara, M., Chatvichienchai, S., Anutariya, C., Wuwongse, V.: Relevancy based access control of versioned XML documents. In: Proc. of the tenth ACM symposium on Access control models and technologies, pp. 85\u201394 (2005)","DOI":"10.1145\/1063979.1063995"},{"issue":"2","key":"23_CR35","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. Transactions on Information and System Security\u00a05(2), 169\u2013202 (2002)","journal-title":"Transactions on Information and System Security"},{"key":"23_CR36","series-title":"Lecture Notes in Computer Science","volume-title":"10th European Symposium On Research In Computer Security","author":"G. Ateniese","year":"2005","unstructured":"Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable signature. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, Springer, Heidelberg (2005)"},{"issue":"1","key":"23_CR37","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1093\/ietfec\/E88-A.1.239","volume":"E88-A","author":"K. Miyazaki","year":"2005","unstructured":"Miyazaki, K., Iwamura, M., Matsumoto, T., Sasaki, R., Yoshiura, H., Tezuka, S., Imai, H.: Digitally signed document sanitizing scheme with disclosure condition control. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences\u00a0E88-A(1), 239\u2013246 (2005)","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"key":"23_CR38","doi-asserted-by":"crossref","unstructured":"Miyazaki, K., Hanaoka, G., Imai, H.: Digitally signed document sanitizing scheme based on bilinear maps. In: Proc. of the 2006 ACM Symposium on Information, computer and communications security, pp. 343\u2013354 (2006)","DOI":"10.1145\/1128817.1128868"},{"key":"23_CR39","doi-asserted-by":"crossref","unstructured":"R\u00f6nnau, S., Scheffczyk, J., Borghoff, U.M.: Towards XML version control of office documents. In: Proc. of the 2005 ACM symposium on Document engineering, pp. 10\u201319 (2005)","DOI":"10.1145\/1096601.1096606"},{"key":"23_CR40","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E.: AC-XML documents: improving the performance of a web access control module. In: Proc. of the tenth ACM symposium on Access control models and technologies, pp. 67\u201376 (2005)","DOI":"10.1145\/1063979.1063993"},{"key":"23_CR41","doi-asserted-by":"crossref","unstructured":"Wang, Y., DeWitt, D.J., Ca, J.Y.: X-Diff: An effective change detection algorithm for XML documents. In: Proc. of the 19th International Conference on Data Engineering, pp. 519\u2013530 (2003)","DOI":"10.1109\/ICDE.2003.1260818"},{"key":"23_CR42","unstructured":"Katsuno, Y., Kudo, M., Watanabe, Y., Yoshihama, S., Perez, R., Sailer, R., van Doorn, L.: Towards multi layer trusted virtual domains. In: Proc. of The Second Workshop on Advances in Trusted Computing (2006)"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75651-4_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:26:41Z","timestamp":1619519201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75651-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540756507"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75651-4_23","relation":{},"subject":[]}}