{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:47Z","timestamp":1725898787498},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_19","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"293-307","source":"Crossref","is-referenced-by-count":1,"title":["On Securely Manipulating XML Data"],"prefix":"10.1007","author":[{"given":"Houari","family":"Mahfoud","sequence":"first","affiliation":[]},{"given":"Abdessamad","family":"Imine","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Robie, J., Chamberlin, D., Dyck, M., Florescu, D., Melton, J., Sim\u00e9on, J.: Xquery update facility 1.0 (March 2011), \n                    \n                      http:\/\/www.w3.org\/TR\/xquery-update-10\/","key":"19_CR1"},{"doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: ACM SIGMOD (2004)","key":"19_CR2","DOI":"10.1145\/1007568.1007634"},{"issue":"3","key":"19_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s10207-008-0074-x","volume":"8","author":"G.M. Kuper","year":"2009","unstructured":"Kuper, G.M., Massacci, F., Rassadko, N.: Generalized XML security views. Int. J. Inf. Sec.\u00a08(3), 173\u2013203 (2009)","journal-title":"Int. J. Inf. Sec."},{"issue":"6","key":"19_CR4","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.csi.2008.03.006","volume":"30","author":"E. Damiani","year":"2008","unstructured":"Damiani, E., Fansi, M., Gabillon, A., Marrara, S.: A general approach to securely querying XML. Computer Standards & Interfaces\u00a030(6), 379\u2013389 (2008)","journal-title":"Computer Standards & Interfaces"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11805588_8","volume-title":"Data and Applications Security XX","author":"N. Rassadko","year":"2006","unstructured":"Rassadko, N.: Policy Classes and Query Rewriting Algorithm for XML Security Views. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 104\u2013118. Springer, Heidelberg (2006)"},{"doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Maneth, S.: Formalizing XML access control for update operations. In: ACM SACMAT (2007)","key":"19_CR6","DOI":"10.1145\/1266840.1266868"},{"unstructured":"Duong, M., Zhang, Y.: An integrated access control for securely querying and updating XML data. In: Australasian Database Conference (2008)","key":"19_CR7"},{"doi-asserted-by":"crossref","unstructured":"ten Cate, B., Lutz, C.: The complexity of query containment in expressive fragments of xpath 2.0. In: Proceedings of the Twenty-Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (2007)","key":"19_CR8","DOI":"10.1145\/1265530.1265541"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-540-24741-8_28","volume-title":"Advances in Database Technology - EDBT 2004","author":"M. Marx","year":"2004","unstructured":"Marx, M.: XPath with Conditional Axis Relations. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 477\u2013494. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Fan, W., Geerts, F., Jia, X., Kementsietsidis, A.: Rewriting regular xpath queries on XML views. In: ICDE (2007)","key":"19_CR10","DOI":"10.1109\/ICDE.2007.367912"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-03793-1_4","volume-title":"Database Programming Languages","author":"B. Groz","year":"2009","unstructured":"Groz, B., Staworko, S., Caron, A.-C., Roos, Y., Tison, S.: XML Security Views Revisited. In: Gardner, P., Geerts, F. (eds.) DBPL 2009. LNCS, vol.\u00a05708, pp. 52\u201367. Springer, Heidelberg (2009)"},{"unstructured":"Berglund, A., Boag, S., Chamberlin, D., Fern\u00e1ndez, M.F., Kay, M., Robie, J., Sim\u00e9on, J.: Xml path language (xpath) 2.0 (second edition). W3C Recommendation (December 2010), \n                    \n                      http:\/\/www.w3.org\/TR\/2010\/REC-xpath20-20101214\/","key":"19_CR12"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-75987-4_7","volume-title":"Database Programming Languages","author":"L. Bravo","year":"2007","unstructured":"Bravo, L., Cheney, J., Fundulaki, I.: Repairing Inconsistent XML Write-Access Control Policies. In: Arenas, M. (ed.) DBPL 2007. LNCS, vol.\u00a04797, pp. 97\u2013111. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T00:23:46Z","timestamp":1557620626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}