{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:57:57Z","timestamp":1725641877651},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_33","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T14:37:08Z","timestamp":1323441428000},"page":"277-285","source":"Crossref","is-referenced-by-count":3,"title":["Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology"],"prefix":"10.1007","author":[{"given":"Subhasis","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"33_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00799-008-0033-1","volume":"8","author":"M.A. Gon\u00e7alves","year":"2008","unstructured":"Gon\u00e7alves, M.A., Watson, L.T., Fox, E.A.: Towards a digital library theory: a formal digital library ontology. Int. J. Digital Libraries\u00a08(2), 91\u2013114 (2008)","journal-title":"Int. J. Digital Libraries"},{"issue":"3","key":"33_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Trans. On Information and System Security\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Trans. On Information and System Security"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Gabillon, A.: A Formal Access Control Model for XML Databases. In: Workshop on Secured Data Management, VLDB (2005)","DOI":"10.1007\/11552338_7"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Bertino, E.: Securing XML Data in Third Party Distribution Systems. In: Proc. ACM CIKM, pp. 99\u2013106 (2005)","DOI":"10.1145\/1099554.1099575"},{"key":"33_CR5","first-page":"41","volume-title":"Security Management, Integrity and Internal Control in Information Systems","author":"C. Farkas","year":"2006","unstructured":"Farkas, C., Gowadia, V., Jain, A., Roy, D.: From XML to RDF: Syntax, Semantics, Security, and Integrity. In: Security Management, Integrity and Internal Control in Information Systems, pp. 41\u201355. Springer, Heidelberg (2006)"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, pp. 121\u2013135. Springer, Heidelberg (2000)"},{"issue":"2","key":"33_CR7","first-page":"296","volume":"14","author":"N.R. Adam","year":"2002","unstructured":"Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A content-based authorization model for digital libraries. Proc. IEEE TKDE 14(2), 296\u2013315 (2002)","journal-title":"Proc. IEEE TKDE"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/11805588_18","volume-title":"Data and Applications Security XX","author":"I. Ray","year":"2006","unstructured":"Ray, I., Chakraborty, S.: A Framework for Flexible Access Control in Digital Library Systems. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 252\u2013266. Springer, Heidelberg (2006)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Fugazza, C., Samarati, P.: Modality Conflicts in Semantics Aware Access Control. In: Proc. ACM ICWE 2006, pp. 249\u2013256 (July 2006)","DOI":"10.1145\/1145581.1145632"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Qin, L., Atluri, V.: Concept-level Access Control for the Semantic Web. In: Proc. ACM Workshop on XML Security, pp. 94\u2013103 (2003)","DOI":"10.1145\/968559.968575"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Caseau, Y.: Efficient Handling of Multiple Inheritance Hierarchies. In: Proc. OOPSLA, pp. 271\u2013287 (1993)","DOI":"10.1145\/165854.165905"},{"issue":"001","key":"33_CR12","first-page":"35","volume":"5","author":"M.F. Bommel van","year":"2000","unstructured":"van Bommel, M.F., Beck, T.J.: Incremental encoding of multiple inheritance hierarchies supporting lattice operations. Electronic Transactions on Artificial Intelligence\u00a05(001), 35\u201349 (2000)","journal-title":"Electronic Transactions on Artificial Intelligence"},{"issue":"2","key":"33_CR13","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.datak.2003.12.001","volume":"5","author":"M.F. Bommel van","year":"2004","unstructured":"van Bommel, M.F., Wang, P.: Encoding Multiple Inheritance Hierarchies for Lattice Operations. Data and Knowledge Engineering\u00a05(2), 175\u2013194 (2004)","journal-title":"Data and Knowledge Engineering"},{"issue":"2","key":"33_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. On Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. On Database Systems"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,21]],"date-time":"2019-04-21T11:44:29Z","timestamp":1555847069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}