{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:35:10Z","timestamp":1770525310862,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_10","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"146-161","source":"Crossref","is-referenced-by-count":7,"title":["fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality"],"prefix":"10.1007","author":[{"given":"Said","family":"Oulmakhzoune","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Morucci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Klyne, G., Carroll, J.: Resource description framework (rdf): Concepts and abstract syntax, \n                    \n                      http:\/\/www.w3.org\/TR\/2004\/REC-rdf-concepts-20040210\/"},{"key":"10_CR2","unstructured":"Prud Hommeaux, E., Seaborne, A.: Sparql query language for rdf (January 2008), \n                    \n                      http:\/\/www.w3.org\/TR\/rdf-sparql-query\/"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. ACM Sigmod Conf. (June 2004)","DOI":"10.1145\/1007568.1007631"},{"key":"10_CR4","unstructured":"Huey, P.: Oracle database security guide: Ch. 7, using oracle virtual private database to control data access, \n                    \n                      http:\/\/download.oracle.com\/docs\/cd\/E11882_01\/network.112\/e10574.pdf"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: Proceedings of the 1974 annual conference, June 1974, pp. 180\u2013186 (1974)","DOI":"10.1145\/800182.810400"},{"key":"10_CR6","unstructured":"Wang, Q., Yu, T., Li, N., Lobo, J., Bertino, E., Irwin, K., Byun, J.: On the correctness criteria of fine-grained access control in relational databases. In: Proceedings of the 33rd international conference on Very large data bases (September 2007)"},{"issue":"2","key":"10_CR7","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for xml documents. ACM Trans. Inf. Syst. Secur.\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Gabillon, A.: A formal access control model for xml databases. In: Proc. Of the 2005 VLDB Workshop on Secure Data Management, SDM (2005)","DOI":"10.1007\/11552338_7"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Finance, B., Medjdoub, S., Pucheral, P.: The case for access control on xml relationships. In: Proc. of CIKM (2005)","DOI":"10.1145\/1099554.1099576"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: Xml document security based on provisional authorization. In: Proc. of ACM CCS (2000)","DOI":"10.1145\/352600.352613"},{"key":"10_CR11","unstructured":"Stoica, A., Farkas, C.: Secure xml views. In: Proc. of the 16th IFIP WG11.3 Working Conference on Database and Application Security (2002)"},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/11593980_11","volume-title":"Information Systems Security","author":"F. Cuppens","year":"2005","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Protection of relationships in xml documents with the xml-bb model. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 148\u2013163. Springer, Heidelberg (2005)"},{"key":"10_CR13","unstructured":"Damiani, E., Fansi, M., Gabillon, A., Marrara, S.: A general approach to securely querying xml. In: Proc. of the 5th International Workshop on Security in Information Systems, WOSIS 2007 (2007)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security (TISSEC)\u00a04(3) (2001)","DOI":"10.1145\/501978.501980"},{"key":"10_CR15","unstructured":"Abou El\u00a0Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Mi\u00e8ge, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy (June 2003)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:42:28Z","timestamp":1606167748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}