{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:50:34Z","timestamp":1761976234806,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41335-3_16","type":"book-chapter","created":{"date-parts":[[2013,10,15]],"date-time":"2013-10-15T16:14:14Z","timestamp":1381853654000},"page":"248-263","source":"Crossref","is-referenced-by-count":15,"title":["Secure Manipulation of Linked Data"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"Kirrane","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Abdelrahman","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Mileo","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Abel, F., De Coi, J.L., Henze, N., Koesling, A.W., Krause, D., Olmedilla, D.: Enabling advanced and context-dependent access control in RDF stores. In: Aberer, K., Choi, K.-S., Noy, N., Allemang, D., Lee, K.-I., Nixon, L.J.B., Golbeck, J., Mika, P., Maynard, D., Mizoguchi, R., Schreiber, G., Cudr\u00e9-Mauroux, P. (eds.) ASWC 2007\/ISWC 2007. LNCS, vol.\u00a04825, pp. 1\u201314. Springer, Heidelberg (2007)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Samarati, P., Jajodia, S.: Authorizations in relational database management systems. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, CCS 1993, pp. 130\u2013139 (1993)","DOI":"10.1145\/168588.168605"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Costabello, L., Villata, S., Delaforge, N.: Linked data access goes mobile: Context-aware authorization for graph stores. In: LDOW - 5th WWW Workshop on Linked Data on the Web (2012)","DOI":"10.3233\/978-1-61499-098-7-282"},{"key":"16_CR4","unstructured":"Dietzold, S., Auer, S.: Access control on RDF triple stores from a semantic wiki perspective. In: ESWC Workshop on Scripting for the Semantic Web (2006)"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1145\/320263.320288","volume":"3","author":"R. Fagin","year":"1978","unstructured":"Fagin, R.: On an authorization mechanism. ACM Transactions on Database Systems (TODS)\u00a03(3), 310\u2013319 (1978)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Gabillon, A., Letouzey, L.: A View Based Access Control Model for SPARQL. In: 2010 Fourth International Conference on Network and System Security, pp. 105\u2013112 (September 2010)","DOI":"10.1109\/NSS.2010.35"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P.P. Griffiths","year":"1976","unstructured":"Griffiths, P.P., Wade, B.W.: An authorization mechanism for a relational database system. ACM Transactions on Database Systems\u00a01, 242\u2013255 (1976)","journal-title":"ACM Transactions on Database Systems"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: ACM SACMAT (2006)","DOI":"10.1145\/1133058.1133076"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P.: Flexible support for multiple access control policies. ACM Trans. Database Syst.\u00a01(212) (2001)","DOI":"10.1145\/383891.383894"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kirrane, S., Lopes, N., Mileo, A., Decker, S.: Protect Your RDF Data! In: Proceedings of the 2nd Joint International Semantic Technology Conference (2012)","DOI":"10.1007\/978-3-642-37996-3_6"},{"key":"16_CR11","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-39218-4_6","volume-title":"Security and Privacy Protection in Information Processing Systems","author":"S. Kirrane","year":"2013","unstructured":"Kirrane, S., Mileo, A., Decker, S.: Applying DAC principles to the RDF graph data model. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IFIP AICT, vol.\u00a0405, pp. 69\u201382. Springer, Heidelberg (2013)"},{"key":"16_CR12","unstructured":"Lopes, N., Kirrane, S., Zimmermann, A., Polleres, A., Mileo, A.: A Logic Programming approach for Access Control over RDF. In: Technical Communications of ICLP 2012, vol.\u00a017, pp. 381\u2013392. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik (2012)"},{"key":"16_CR13","unstructured":"Reddivari, P., Finin, T., Joshi, A.: Policy-Based Access Control for an RDF Store. In: Proceedings of the IJCAI 2007 Workshop on Semantic Web for Collaborative Knowledge Acquisition (January 2007)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Sacco, O., Passant, A., Decker, S.: An Access Control Framework for the Web of Data. In: 10th International Conference on Trust, Security and Privacy in Computing and Communications (2011)","DOI":"10.1109\/TrustCom.2011.59"},{"key":"16_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., de Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Communications Magazine (1994)","DOI":"10.1109\/35.312842"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41335-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T17:12:18Z","timestamp":1746033138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41335-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387081","9783642387098"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41335-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}