{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:14Z","timestamp":1725496214610},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771128"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77115-9_12","type":"book-chapter","created":{"date-parts":[[2007,11,29]],"date-time":"2007-11-29T10:11:56Z","timestamp":1196331116000},"page":"116-128","source":"Crossref","is-referenced-by-count":2,"title":["Hasslefree: Simplified Access Control Management for XML Documents"],"prefix":"10.1007","author":[{"given":"Ashish","family":"Tripathi","sequence":"first","affiliation":[]},{"given":"M. M.","family":"Gore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Berglund, A., Boag, S., Chamberlin, D., Robie, J., Fernndez, M.F., Kay, M., Simon, J.: Xml path language(xpath) version 2.0. W3C Recommendation (2007), see http:\/\/www.w3.org\/tr\/xpath20"},{"key":"12_CR2","first-page":"21","volume-title":"IEEE Internet Computing","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: Securing xml documents with author-x. In: IEEE Internet Computing, pp. 21\u201331. IEEE, Los Alamitos (2001)"},{"issue":"3","key":"12_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur.\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TDSC.2005.9","volume":"2","author":"E. Bertino","year":"2005","unstructured":"Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Trans. Dependable Secur. Comput.\u00a02(1), 2\u201319 (2005)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"12_CR5","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1145\/1007568.1007634","volume-title":"SIGMOD 2004. Proceedings of the 2004 ACM SIGMOD international conference on Management of data","author":"W. Fan","year":"2004","unstructured":"Fan, W., Chan, C.-Y., Garofalakis, M.: Secure xml querying with security views. In: SIGMOD 2004. Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 587\u2013598. ACM Press, New York (2004)"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1099554.1099576","volume-title":"CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management","author":"A. Finance","year":"2005","unstructured":"Finance, A., Medjdoub, S., Pucheral, P.: The case for access control on xml relationships. In: CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management, pp. 107\u2013114. ACM Press, New York (2005)"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/990036.990046","volume-title":"SACMAT 2004. Proceedings of the ninth ACM symposium on Access control models and technologies","author":"I. Fundulaki","year":"2004","unstructured":"Fundulaki, I., Marx, M.: Specifying access control policies for xml documents with xpath. In: SACMAT 2004. Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 61\u201369. ACM Press, New York (2004)"},{"key":"12_CR8","first-page":"299","volume-title":"Das 2001. Proceedings of the fifteenth annual working conference on Database and application security","author":"A. Gabillon","year":"2002","unstructured":"Gabillon, A., Bruno, E.: Regulating access to xml documents. In: Das 2001. Proceedings of the fifteenth annual working conference on Database and application security, Norwell, MA, USA, pp. 299\u2013314. Kluwer Academic Publishers, Dordrecht (2002)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"1230","DOI":"10.1109\/ICDE.2005.174","volume-title":"ICDEW 2005. Proceedings of the 21st International Conference on Data Engineering Workshops","author":"N. Kitagawa","year":"2005","unstructured":"Kitagawa, N., Yoshikawa, M.: A study on efficient access control for xml ducuments. In: ICDEW 2005. Proceedings of the 21st International Conference on Data Engineering Workshops, p. 1230. IEEE Computer Society, Washington, DC, USA (2005)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/352600.352613","volume-title":"CCS 2000. Proceedings of the 7th ACM conference on Computer and communications security","author":"M. Kudo","year":"2000","unstructured":"Kudo, M., Hada, S.: Xml document security based on provisional authorization. In: CCS 2000. Proceedings of the 7th ACM conference on Computer and communications security, pp. 87\u201396. ACM Press, New York (2000)"},{"key":"12_CR11","unstructured":"Matheus, A.: How to declare access control policies for xml structured information objects using oasis\u2019 extensible access control markup language (xacml). In: HICSS 2005. Proceedings of the 38th Hawaii International Conference on System Sciences (2005)"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB 2003. Proceedings of the 29th international conference on Very large data bases, pp. 898\u2013909 (2004)","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Mohan, S., Klinginsmith, J., Sengupta, A., Wu, Y.: Acxess - access control for xml with enhanced security specifications. In: ICDE 2006. Proceedings of the 2006 International Conference on Data Engineering, p. 171 (2006)","DOI":"10.1109\/ICDE.2006.12"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1145\/1099554.1099612","volume-title":"CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management","author":"S. Mohan","year":"2005","unstructured":"Mohan, S., Sengupta, A., Wu, Y.: Access control for xml: a dynamic query rewriting approach. In: CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management, pp. 251\u2013252. ACM Press, New York (2005)"},{"key":"12_CR15","unstructured":"Mohan, S., Wu, Y.: Ipac: an interactive approach to access control for semi-structured data. In: VLDB\u20192006: Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment, pp. 1147\u20131150 (2006)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/948109.948122","volume-title":"CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security","author":"M. Murata","year":"2003","unstructured":"Murata, M., Tozawa, A., Kudo, M., Hada, S.: Xml access control using static analysis. In: CCS 2003. Proceedings of the 10th ACM conference on Computer and communications security, pp. 73\u201384. ACM Press, New York (2003)"},{"key":"12_CR17","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1145\/1099554.1099577","volume-title":"CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management","author":"N. Qi","year":"2005","unstructured":"Qi, N., Kudo, M., Myllymaki, J., Pirahesh, H.: A function-based access control model for xml databases. In: CIKM 2005. Proceedings of the 14th ACM international conference on Information and knowledge management, pp. 115\u2013122. ACM Press, New York (2005)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/978-3-540-30577-4_34","volume-title":"SOFSEM 2005: Theory and Practice of Computer Science","author":"R. Steele","year":"2005","unstructured":"Steele, R., Gardner, W., Dillion, T.S., Eradi, A.: Xml-based declarative access control. In: Vojt\u00e1\u0161, P., Bielikov\u00e1, M., Charron-Bost, B., S\u00fdkora, O. (eds.) SOFSEM 2005. LNCS, vol.\u00a03381, pp. 310\u2013319. Springer, Heidelberg (2005)"},{"key":"12_CR19","unstructured":"Tripathi., A.: Hasslefree: Simplified access control management for xml documents. Master\u2019s Thesis: Department of Computer Science and Engineering, Motilal Nehru National Institute of Techology, Allahabad, Uttar Pradesh, India (2007)"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/990036.990047","volume-title":"SACMAT 2004. Proceedings of the ninth ACM symposium on Access control models and technologies","author":"J. Wang","year":"2004","unstructured":"Wang, J., Osborn, S.L.: A role-based approach to access control for xml databases. In: SACMAT 2004. Proceedings of the ninth ACM symposium on Access control models and technologies, pp. 70\u201377. ACM Press, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77115-9_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:00:46Z","timestamp":1619521246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77115-9_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771128"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77115-9_12","relation":{},"subject":[]}}