{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T03:27:32Z","timestamp":1764732452559},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_5","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"65-80","source":"Crossref","is-referenced-by-count":4,"title":["A Labelling System for Derived Data Control"],"prefix":"10.1007","author":[{"given":"Enrico","family":"Scalavino","sequence":"first","affiliation":[]},{"given":"Vaibhav","family":"Gowadia","sequence":"additional","affiliation":[]},{"given":"Emil C.","family":"Lupu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Authentica: Enterprise rights management for document protection, White Paper (2005)"},{"key":"5_CR2","unstructured":"Microsoft: Technical overview of windows rights management services for windows server 2003 (2005), White Paper, \n                    \n                      http:\/\/www.safecomprogram.gov\n                    \n                    \n                   (accessed December 2009)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Mont, M.C., Pearson, S., Bramhall, P.: Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In: 14th Int. Workshop on Database and Expert Systems Applications (DEXA), Prague, Czech Republic, September 2003, pp. 377\u2013382 (2003)","DOI":"10.1109\/DEXA.2003.1232051"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1109\/ACSAC.2000.898877","volume-title":"16th An. Computer Security Applications Conf. (ACSAC)","author":"J. Park","year":"2000","unstructured":"Park, J., Sandhu, R.S., Schifalacqua, J.: Security architectures for controlled digital information dissemination. In: 16th An. Computer Security Applications Conf (ACSAC), p. 224. IEEE Computer Society, Los Alamitos (2000)"},{"issue":"9","key":"5_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A. Pretschner","year":"2006","unstructured":"Pretschner, A., Hilty, M., Basin, D.A.: Distributed usage control. Commun. ACM\u00a049(9), 39\u201344 (2006)","journal-title":"Commun. ACM"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J. Park","year":"2004","unstructured":"Park, J., Sandhu, R.S.: The UCON\n                  \n                    ABC\n                   usage control model. ACM Trans. Inf. Syst. Secur.\u00a07(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"5_CR7","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report M74-244, The Mitre Corp. (May 1973)"},{"issue":"5","key":"5_CR8","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"D.E. Dorothy","year":"1976","unstructured":"Dorothy, D.E.: A lattice model of secure information flow. Commun. ACM\u00a019(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Papagiannis, I., Migliavacca, M., Pietzuch, P.R., Shand, B., Eyers, D.M., Bacon, J.: Privateflow: decentralised information flow control in event based middleware. In: DEBS (2009)","DOI":"10.1145\/1619258.1619306"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Vandebogart, S., Efstathopoulos, P., Kohler, E., Krohn, M.N., Frey, C., Ziegler, D., Kaashoek, M.F., Morris, R., Mazi\u00e8res, D.: Labels and event processes in the Asbestos operating system. ACM Trans. Comput. Syst.\u00a025(4) (2007)","DOI":"10.1145\/1314299.1314302"},{"key":"5_CR11","unstructured":"Liquid Machines and Microsoft Windows Rights Management Services (RMS): End-to-end Rights Management for the Enterprise (2006), \n                    \n                      http:\/\/www.cmdsolutions.com\/pdfs\/LiquidMachines%20Windows%20RMS%20Business%20White%20Paper%20FINAL%20060213.pdf\n                    \n                    \n                   (accessed September 2009)"},{"key":"5_CR12","unstructured":"The Marlin Open Digital Content Sharing Platform (2009), \n                    \n                      http:\/\/www.marlin-community.com\/\n                    \n                    \n                   (accessed February 2010)"},{"key":"5_CR13","unstructured":"eXtensible Access Control markup language (xacml) version 2.0 (2005)"},{"key":"5_CR14","unstructured":"Content Guard: eXtensible rights Markup Language (XrML) 2.0, Specification (2001)"},{"key":"5_CR15","unstructured":"Iannella, R.: Open Digital Rights Language (ODRL), Version 1.1. W3c note, World Wide Web Consortium (2002)"},{"key":"5_CR16","unstructured":"Ashley, P., Hada, S.: Karjoth, G., Powers, C., Schunter, M.: The enterprise privacy authorization language (epal 1.1), Reader\u2019s Guide to the Documentation (2003)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Fan, H.: Tracing data lineage using automed schema transformation pathways. In: BNCOD, pp. 50\u201353 (2002)","DOI":"10.1007\/3-540-45495-0_6"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Fan, H.: Data lineage tracing in data warehousing environments. In: BNCOD, pp. 25\u201336 (2007)","DOI":"10.1007\/978-3-540-73390-4_4"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Fan, H., Poulovassilis, A.: Using schema transformation pathways for data lineage tracing. In: BNCOD, pp. 133\u2013144 (2005)","DOI":"10.1007\/11511854_11"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/504909.504912","volume":"5","author":"V. Atluri","year":"2002","unstructured":"Atluri, V., Gal, A.: An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur.\u00a05(1), 62\u201394 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol.\u00a09(4), 410\u2013442 (2000)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. In: Proceedings of the 18th IEEE Workshop on Computer Security Foundations (CSFW 2005), pp. 255\u2013269 (2005)","DOI":"10.1109\/CSFW.2005.15"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-04444-1_5","volume-title":"Computer Security \u2013 ESORICS 2009","author":"A. Lux","year":"2009","unstructured":"Lux, A., Mantel, H.: Declassification with explicit reference points. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 69\u201385. Springer, Heidelberg (2009)"},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/4236.935172","volume":"5","author":"E. Bertino","year":"2001","unstructured":"Bertino, E., Castano, S., Ferrari, E.: Securing XML documents with Author-X. Internet Computing, IEEE\u00a05(3), 21\u201331 (2001)","journal-title":"Internet Computing, IEEE"},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for xml documents. ACM Trans. Inf. Syst. Secur.\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:37Z","timestamp":1606185757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}