{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T07:25:43Z","timestamp":1725607543147},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642239342"},{"type":"electronic","value":"9783642239359"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23935-9_27","type":"book-chapter","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T07:31:55Z","timestamp":1315812715000},"page":"275-284","source":"Crossref","is-referenced-by-count":1,"title":["OAuth+UAO: A Distributed Identification Mechanism for Triplestores"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Tomaszuk","sequence":"first","affiliation":[]},{"given":"Henryk","family":"Rybi\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Prud\u2019hommeaux, E., Seaborne, A.: SPARQL Query Language for RDF, World Wide Web Consortium (2008)"},{"key":"27_CR2","unstructured":"Schenk, S., Gearon P., Passant A.: SPARQL 1.1 Update, World Wide Web Consortium (2010)"},{"key":"27_CR3","unstructured":"Klyne, G., Carroll, J.J.: Resource Description Framework (RDF): Concepts and Abstract Syntax. World Wide Web Consortium (2004)"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Carroll, J.J., Bizer, C., Hayes, P., Stickler, P.: Named graphs, provenance and trust. In: 14th International Conference on World Wide Web. ACM, New York (2005)","DOI":"10.1145\/1060745.1060835"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Hammer-Lahav, E.: The OAuth 1.0 Protocol. Internet Engineering Task Force (2010)","DOI":"10.17487\/rfc5849"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Transactions on Storage (2006)","DOI":"10.1145\/1149976.1149977"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Special Interest Group on Management Of Data. ACM, New York (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Database Technology - EDBT \u201988","author":"E. Bertino","year":"1988","unstructured":"Bertino, E., Haas, L.M.: Views and security in distributed database management systems. In: Schmidt, J.W., Missikoff, M., Ceri, S. (eds.) EDBT 1988. LNCS, vol.\u00a0303, Springer, Heidelberg (1988)"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Ahn, G., Sandhu, R.: Role-based authorization constraints specification. ACM Transactions on Information and System Security, TISSEC (2000)","DOI":"10.1145\/382912.382913"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. Database systems for Advanced Applications (2004)","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"27_CR11","unstructured":"Paraboschi, S., Samarati, P.: Regarding access to semistructured information on the web. In: 16th IFIP TC11 Annual Working Conference on Information Security: Information Security for Global Information Infrastrukture (2000)"},{"key":"27_CR12","volume-title":"Proceedings of the 2nd International Workshop on Web Information and Data Management","author":"E. Bertino","year":"1999","unstructured":"Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Controlled access and dissemination of XML documents. In: WIDM 1999 Proceedings of the 2nd International Workshop on Web Information and Data Management. ACM, New York (1999)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Kudo, M., Subrahmanian, V.S.: Provisional authorizations. E-commerce Security and Privacy (2001)","DOI":"10.1007\/978-1-4615-1467-1_8"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: The Second ACM Workshop on Digital Identity Management. ACM, New York (2006)","DOI":"10.1145\/1179529.1179532"},{"key":"27_CR15","unstructured":"Kaila, P.: OAuth and OpenID 2.0. The Seminar on network security (2008)"},{"key":"27_CR16","unstructured":"Cantor, S., Kemp, J., Philpott, R., Maler, E.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. Organization for the Advancement of Structured Information Standard (2005)"},{"key":"27_CR17","unstructured":"Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0, Organization for the Advancement of Structured Information Standard (2005)"},{"key":"27_CR18","unstructured":"Reddivari, P., Finin, T., Joshi, A.: Policy based Access Control for a RDF Store. In: Proceedings of the Policy Management for the Web Workshop (2005)"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-76298-0_1","volume-title":"The Semantic Web","author":"F. Abel","year":"2007","unstructured":"Abel, F., Luca De Coi, J., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF stores. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L.J.B., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudr\u00e9-Mauroux, P. (eds.) ASWC 2007 and ISWC 2007. LNCS, vol.\u00a04825, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"27_CR20","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1007\/978-3-540-85565-1_72","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"J. Kim","year":"2008","unstructured":"Kim, J., Jung, K., Park, S.: An introduction to authorization conflict problem in RDF access control. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part II. LNCS (LNAI), vol.\u00a05178, pp. 583\u2013592. Springer, Heidelberg (2008)"},{"key":"27_CR21","volume-title":"11th ACM Symposium on Access Control Models and Technologies","author":"A. Jain","year":"2006","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: 11th ACM Symposium on Access Control Models and Technologies. ACM, New York (2006)"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS(LNAI), vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)","DOI":"10.1007\/978-3-540-45217-1_18"},{"key":"27_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-39718-2_23","volume-title":"The Semantic Web - ISWC 2003","author":"M. Richardson","year":"2003","unstructured":"Richardson, M., Agrawal, R., Domingos, P.: Trust management for the semantic web. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol.\u00a02870, pp. 351\u2013368. Springer, Heidelberg (2003)"},{"key":"27_CR24","unstructured":"Story, H., Harbulot, B., Jacobi, I., Jones, M.: FOAF+SSL: RESTful Authentication for the Social Web. In: European Semantic Web Conference (2009)"},{"key":"27_CR25","unstructured":"Gamble, M., Goble, C.: Standing on the Shoulders of the Trusted Web: Trust, Scholarship and Linked Data. In: Web Science Conference (2010)"},{"key":"27_CR26","unstructured":"Khare, R., Rifkin, A.: Weaving a Web of trust. World Wide Web Journal - Special issue: Web security: a matter of trust (1997)"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Bizer, C., Heath, T., Berners-Lee, T.: Linked Data - The Story So Far. International Journal on Semantic Web and Information Systems (2009)","DOI":"10.4018\/jswis.2009081901"},{"key":"27_CR28","unstructured":"Brickley, D., Miller, L.: FOAF Vocabulary Specification 0.98. FOAF Project (2010)"},{"key":"27_CR29","unstructured":"Beckett, D., Berners-Lee, T.: Turtle - Terse RDF Triple Language. In: World Wide Web Consortium (2008)"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23935-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,15]],"date-time":"2019-06-15T06:23:37Z","timestamp":1560579817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23935-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642239342","9783642239359"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23935-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}