{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:20:48Z","timestamp":1725492048526},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540759867"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-75987-4_7","type":"book-chapter","created":{"date-parts":[[2007,10,4]],"date-time":"2007-10-04T09:29:16Z","timestamp":1191490156000},"page":"97-111","source":"Crossref","is-referenced-by-count":1,"title":["Repairing Inconsistent XML Write-Access Control Policies"],"prefix":"10.1007","author":[{"given":"Loreto","family":"Bravo","sequence":"first","affiliation":[]},{"given":"James","family":"Cheney","sequence":"additional","affiliation":[]},{"given":"Irini","family":"Fundulaki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1145\/303976.303983","volume-title":"PODS","author":"M. Arenas","year":"1999","unstructured":"Arenas, M., Bertossi, L., Chomicki, J.: Consistent Query Answers in Inconsistent Databases. In: PODS, pp. 68\u201379. ACM Press, New York (1999)"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM TISSEC\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM TISSEC"},{"key":"7_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/11601524_17","volume-title":"Database Programming Languages","author":"L. Bertossi","year":"2005","unstructured":"Bertossi, L., Bravo, L., Franconi, E., Lopatenko, A.: Complexity and Approximation of Fixing Numerical Attributes in Databases Under Integrity Constraints. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol.\u00a03774, pp. 262\u2013278. Springer, Heidelberg (2005)"},{"key":"7_CR4","unstructured":"Bravo, L., Cheney, J., Fundulaki, I.: Repairing Inconsistent XML Write-Access Control Policies (August 2007), \n                    \n                      http:\/\/arxiv.org\/abs\/0708.2076"},{"key":"7_CR5","unstructured":"Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (Fourth Edition) (September 2006), \n                    \n                      http:\/\/www.w3.org\/TR\/REC-xml\/"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Cautis, B., Abiteboul, S., Milo, T.: Reasoning about XML Update Constraints. In: PODS, pp. 195\u2013204 (2007)","DOI":"10.1145\/1265530.1265558"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1146238.1146253","volume-title":"ISSTA","author":"P. Centonze","year":"2006","unstructured":"Centonze, P., Naumovich, G., Fink, S.J., Pistoia, M.: Role-Based Access Control Consistency Validation. In: ISSTA, pp. 121\u2013132. ACM Press, New York (2006)"},{"key":"7_CR8","unstructured":"Chamberlin, D., Florescu, D., Robie, J.: XQuery Update Facility. W3C Working Draft (July 2006), \n                    \n                      http:\/\/www.w3.org\/TR\/xqupdate\/"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1287\/moor.4.3.233","volume":"4","author":"V. Chvatal","year":"1979","unstructured":"Chvatal, V.: A Greedy Heuristic for the Set Covering Problem. Mathematics of Operations Research\u00a04, 233\u2013235 (1979)","journal-title":"Mathematics of Operations Research"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De di Capitani, S., Paraboschi, S., Samarati, P.: A Fine-grained Access Control System for XML Documents. ACM TISSEC\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM TISSEC"},{"key":"7_CR11","first-page":"587","volume-title":"ACM SIGMOD","author":"W. Fan","year":"2004","unstructured":"Fan, W., Chan, C.-Y., Garofalakis, M.: Secure XML Querying with Security Views. In: ACM SIGMOD, pp. 587\u2013598. ACM Press, New York (2004)"},{"issue":"6","key":"7_CR12","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"R. Floyd","year":"1962","unstructured":"Floyd, R.: Algorithm 97: Shortest path. Communications of the ACM\u00a05(6), 345 (1962)","journal-title":"Communications of the ACM"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Maneth, S.: Formalizing XML Access Control for Update Operations. In: SACMAT, pp. 169\u2013174 (2007)","DOI":"10.1145\/1266840.1266868"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Marx, M.: Specifying Access Control Policies for XML Documents with XPath. In: SACMAT, pp. 61\u201369 (2004)","DOI":"10.1145\/990036.990046"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kuper, G., Massacci, F., Rassadko, N.: Generalized XML Security Views. In: SACMAT, pp. 77\u201384 (2005)","DOI":"10.1145\/1063979.1063994"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/968559.968568","volume-title":"ACM Workshop on XML Security","author":"C.-H. Lim","year":"2003","unstructured":"Lim, C.-H., Park, S., Son, S.H.: Access control of XML documents considering update operations. In: ACM Workshop on XML Security, pp. 49\u201359. ACM Press, New York (2003)"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/1178618.1178621","volume":"9","author":"M. Murata","year":"2006","unstructured":"Murata, M., Tozawa, A., Kudo, M., Hada, S.: XML Access Control Using Static Analysis. ACM TISSEC\u00a09(3), 290\u2013331 (2006)","journal-title":"ACM TISSEC"},{"key":"7_CR18","volume-title":"Computational Complexity","author":"C. Papadimitriou","year":"1994","unstructured":"Papadimitriou, C.: Computational Complexity. Addison-Wesley, Reading (1994)"},{"key":"7_CR19","first-page":"133","volume-title":"IFIP WG 11.3","author":"A. Stoica","year":"2002","unstructured":"Stoica, A., Farkas, C.: Secure XML Views. In: IFIP WG 11.3, vol.\u00a0256, pp. 133\u2013146. Kluwer, Dordrecht (2002)"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1137\/0210021","volume":"10","author":"M. Yannakakis","year":"1981","unstructured":"Yannakakis, M.: Edge-Deletion Problems. SIAM Journal on Computing\u00a010(2), 297\u2013309 (1981)","journal-title":"SIAM Journal on Computing"}],"container-title":["Lecture Notes in Computer Science","Database Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75987-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:38:45Z","timestamp":1619505525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75987-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540759867"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75987-4_7","relation":{},"subject":[]}}