{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:27:34Z","timestamp":1742394454044},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540852582"},{"type":"electronic","value":"9783540852599"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85259-9_10","type":"book-chapter","created":{"date-parts":[[2008,8,17]],"date-time":"2008-08-17T01:38:18Z","timestamp":1218937098000},"page":"151-168","source":"Crossref","is-referenced-by-count":5,"title":["Query Rewriting for Access Control on Semantic Web"],"prefix":"10.1007","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[]},{"given":"William K.","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1007\/11762256_51","volume-title":"The Semantic Web: Research and Applications","author":"P.A. Bonatti","year":"2006","unstructured":"Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic Web policies - A discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol.\u00a04011, pp. 712\u2013724. Springer, Heidelberg (2006)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Cautis, B.: Distributed access control: A privacy-conscious approach. In: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, Sophia, Antipolis, France (2007)","DOI":"10.1145\/1266840.1266850"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Duma, C., Herzog, A., Shahmehri, N.: Privacy in the Semantic Web: What policy languages have to offer. In: Proceedings of the 11th IEEE International Workshop on Policies for Distributed Systems and Networks (2007)","DOI":"10.1109\/POLICY.2007.39"},{"issue":"4","key":"10_CR4","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/s007780100054","volume":"10","author":"A.Y. Halevy.","year":"2001","unstructured":"Halevy., A.Y.: Answering queries using views: A survey. VLDB Journal 2001\u00a010(4), 270\u2013294 (2001)","journal-title":"VLDB Journal 2001"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/978-3-540-39718-2_26","volume-title":"The Semantic Web - ISWC 2003","author":"L. Kagal","year":"2003","unstructured":"Kagal, L., Finin, T., Joshi, A.: A policy based approach to security for the Semantic Web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 402\u2013418. Springer, Heidelberg (2003)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Proceedings of the 2005 Workshop on Secure Web Services (2005)","DOI":"10.1145\/1103022.1103030"},{"key":"10_CR7","unstructured":"Javanmardi, S., Amini, M., Jalili, R.: An access control model for protecting Semantic Web resources. In: Proceedings of the 2nd International Semantic Web Policy Workshop, Athens, GA (2006)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: An access control model. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA (2006)","DOI":"10.1145\/1133058.1133076"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/978-3-540-72586-2_103","volume-title":"Computational Science \u2013 ICCS 2007","author":"D. Jeong","year":"2007","unstructured":"Jeong, D., Jing, Y., Baik, D.-K.: Access control model based on RDB security policy for OWL ontology. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol.\u00a04488, pp. 720\u2013727. Springer, Heidelberg (2007)"},{"issue":"2","key":"10_CR10","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"10_CR11","unstructured":"Li, Q., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, Virginia (2003)"},{"key":"10_CR12","unstructured":"Lakshmanan, V.S.L., Wang, H., Zhao, Z.: Answering tree pattern queries using views. In: Proceedings of the 32nd International Conference on Very Large Databases, Seoul, Korea, pp. 571\u2013582 (2006)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of 2004 ACM SIGMOD International Conference on Management of Data, Paris, France (2004)","DOI":"10.1145\/1007568.1007631"},{"key":"10_CR14","unstructured":"World Wide Web Consortium. Semantic Web, \n                    \n                      http:\/\/www.w3.org\/2001\/sw\/"},{"key":"10_CR15","unstructured":"World Wide Web. RDF Vocabulary Description Language 1.0: RDF Schema (December 2003), \n                    \n                      http:\/\/www.w3.org\/TR\/rdf-schema\/"},{"key":"10_CR16","unstructured":"World Wide Web Consortium. OWL Web Ontology Language Overview (December 2003), \n                    \n                      http:\/\/www.w3.org\/TR\/owl-features\/"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-76298-0_1","volume-title":"The Semantic Web","author":"F. Abel","year":"2007","unstructured":"Abel, F., Coi, J., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF Stores. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudr\u00e9-Mauroux, P. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol.\u00a04825, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-48005-6_7","volume-title":"The Semantic Web - ISWC 2002","author":"J. Broekstra","year":"2002","unstructured":"Broekstra, J., Kampman, A., van Harmelen, F.: Sesame: A generic architecture for storing and querying RDF and RDF Schema. In: Horrocks, I., Hendler, J. (eds.) ISWC 2002. LNCS, vol.\u00a02342, pp. 54\u201368. Springer, Heidelberg (2002)"},{"key":"10_CR19","unstructured":"Wilkinson, K., Sayers, C., Kuno, H., Reynolds, D.: Efficient RDF storage and retrieval in Jena2. In: Proceeding of the 1st International Workshop on Semantic Web and Databases, Berlin (2003)"},{"key":"10_CR20","unstructured":"Heflin, J., Hendler, J., and Luke, S.: SHOE: A knowledge representation language for internet applications. Technical Report CS-TR-4078 (UMIACS TR-99-71), Dept. of Computer Science, University of Maryland at College Park (1999)"},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"330","DOI":"10.1007\/978-3-540-27834-4_41","volume-title":"Web Engineering","author":"E. Damiani","year":"2004","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Extending policy languages to the Semantic Web. In: Koch, N., Fraternali, P., Wirsing, M. (eds.) ICWE 2004. LNCS, vol.\u00a03140, pp. 330\u2013343. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Secure Data Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85259-9_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:32:15Z","timestamp":1619508735000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85259-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540852582","9783540852599"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85259-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}