{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:46:12Z","timestamp":1725702372640},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_9","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T04:27:01Z","timestamp":1348115221000},"page":"111-122","source":"Crossref","is-referenced-by-count":1,"title":["A Graph-Based Formalism for Controlling Access to a Digital Library Ontology"],"prefix":"10.1007","author":[{"given":"Subhasis","family":"Dasgupta","sequence":"first","affiliation":[]},{"given":"Aditya","family":"Bagchi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s00799-008-0033-1","volume":"8","author":"M.A. Gon\u00e7alves","year":"2008","unstructured":"Gon\u00e7alves, M.A., Fox, E.A., Watson, L.T.: Towards a digital library theory: a formal digital library ontology. Int. J. Digit. Libr.\u00a08, 91\u2013114 (2008)","journal-title":"Int. J. Digit. Libr."},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/69.991718","volume":"14","author":"N.R. Adam","year":"2002","unstructured":"Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: A content-based authorization model for digital libraries. IEEE Transactions on Knowledge and Data Engineering\u00a014, 296\u2013315 (2002)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/11805588_18","volume-title":"Data and Applications Security XX","author":"I. Ray","year":"2006","unstructured":"Ray, I., Chakraborty, S.: A Framework for Flexible Access Control in Digital Library Systems. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 252\u2013266. Springer, Heidelberg (2006)"},{"key":"9_CR4","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-642-27245-5_33","volume-title":"Computer Information Systems \u2013 Analysis and Technologies","author":"S. Dasgupta","year":"2011","unstructured":"Dasgupta, S., Bagchi, A.: Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library Ontology. In: Chaki, N., Cortesi, A. (eds.) CISIM 2011. CCIS, vol.\u00a0245, pp. 277\u2013285. Springer, Heidelberg (2011)"},{"volume-title":"Handbook of graph grammars and computing by graph transformation: applications, languages, and tools","year":"1999","key":"9_CR5","unstructured":"Ehrig, H., Engels, G., Kreowski, H.J., Rozenberg, G. (eds.): Handbook of graph grammars and computing by graph transformation: applications, languages, and tools, vol.\u00a02. World Scientific Publishing Co., Inc., River Edge (1999)"},{"key":"9_CR6","first-page":"163","volume-title":"Algebraic approaches to graph transformation. Part I: basic concepts and double pushout approach","author":"A. Corradini","year":"1997","unstructured":"Corradini, A., Montanari, U., Rossi, F., Ehrig, H., Heckel, R., L\u00f6we, M.: In: Algebraic approaches to graph transformation. Part I: basic concepts and double pushout approach, pp. 163\u2013245. World Scientific Publishing Co., Inc., River Edge (1997)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jcss.2004.11.002","volume":"71","author":"M. Koch","year":"2005","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: Graph-based specification of access control policies. Journal of Computer and System Sciences\u00a071(1), 1\u201333 (2005)","journal-title":"Journal of Computer and System Sciences"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: On the specification and evolution of access control policies. In: SACMAT, pp. 121\u2013130 (2001)","DOI":"10.1145\/373256.373280"},{"key":"9_CR9","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/s007780050029","volume":"5","author":"V. Kashyap","year":"1996","unstructured":"Kashyap, V., Sheth, A.: Semantic and schematic similarities between database objects: a context-based approach. The VLDB Journal\u00a05, 276\u2013304 (1996)","journal-title":"The VLDB Journal"},{"key":"9_CR10","first-page":"52","volume":"4","author":"L. Qin","year":"2010","unstructured":"Qin, L., Atluri, V.: Semantics aware security policy specification for the semantic web data. Int. J. Inf. Comput. Secur.\u00a04, 52\u201375 (2010)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1008626109650","volume":"7","author":"A.M. Ouksel","year":"1999","unstructured":"Ouksel, A.M., Ahmed, I.: Ontologies are not the panacea in data integration: A flexible coordinator to mediate context construction. Distributed and Parallel Databases\u00a07, 7\u201335 (1999), doi:10.1023\/A:1008626109650","journal-title":"Distributed and Parallel Databases"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Fugazza, C., Samarati, P.: Modality conflicts in semantics aware access control. In: Wolber, D., Calder, N., Brooks, C.H., Ginige, A. (eds.) ICWE, pp. 249\u2013256. ACM (2006)","DOI":"10.1145\/1145581.1145632"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/11552338_7","volume-title":"Secure Data Management","author":"A. Gabillon","year":"2005","unstructured":"Gabillon, A.: A Formal Access Control Model for XML Databases. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 86\u2013103. Springer, Heidelberg (2005)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Damiani, E., Maruyama, H. (eds.) Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, pp. 43\u201352. ACM (2005)","DOI":"10.1145\/1103022.1103030"},{"issue":"1","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/504909.504910","volume":"5","author":"P.A. Bonatti","year":"2002","unstructured":"Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur.\u00a05(1), 1\u201335 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur."}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:00:40Z","timestamp":1620115240000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}