{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:46:15Z","timestamp":1742939175064,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662442999"},{"type":"electronic","value":"9783662443002"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44300-2_2","type":"book-chapter","created":{"date-parts":[[2014,7,24]],"date-time":"2014-07-24T09:36:37Z","timestamp":1406194597000},"page":"21-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Generating XACML Enforcement Policies for Role-Based Access Control of XML Documents"],"prefix":"10.1007","author":[{"given":"Alberto","family":"De la Rosa Algar\u00edn","sequence":"first","affiliation":[]},{"given":"Timoteus B.","family":"Ziminski","sequence":"additional","affiliation":[]},{"given":"Steven A.","family":"Demurjian","sequence":"additional","affiliation":[]},{"given":"Yaira K.","family":"Rivera S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Kuykendall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,25]]},"reference":[{"key":"2_CR1","first-page":"137","volume-title":"Ethics, Computing, and Genomics","author":"D Baumer","year":"2006","unstructured":"Baumer, D., Earp, J.B., Payton, F.C.: Privacy of medical records: IT implications of HIPAA. In: Tavani, H.T. (ed.) Ethics, Computing, and Genomics, pp. 137\u2013152. Jones and Bartlett, Sudbury (2006)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/S1363-4127(04)00029-9","volume":"9","author":"E Bertino","year":"2004","unstructured":"Bertino, E., Carminati, B., Ferrari, E.: Access control for XML documents and data. Inf. Secur. Techn. Rep. 9, 19\u201334 (2004)","journal-title":"Inf. Secur. Techn. Rep."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur. (TISSEC) 5, 290\u2013331 (2002)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"2_CR4","unstructured":"Clark, J.: Xsl Transformations (Xslt). World Wide Web Consortium (W3C). http:\/\/www.w3.org\/TR\/xslt (1999)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S1389-1286(00)00053-0","volume":"33","author":"E Damiani","year":"2000","unstructured":"Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., et al.: Design and implementation of an access control processor for XML documents. Comput. Netw. 33, 59\u201375 (2000)","journal-title":"Comput. Netw."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.csi.2008.03.006","volume":"30","author":"E Damiani","year":"2008","unstructured":"Damiani, E., Fansi, M., Gabillon, A., et al.: A general approach to securely querying XML. Comput. Stan. Interfaces 30, 379\u2013389 (2008)","journal-title":"Comput. Stan. Interfaces"},{"key":"2_CR7","volume-title":"Accepted in Emerging Trends in Information and Communication Technologies Security","author":"A De la Rosa Algar\u00edn","year":"2013","unstructured":"De la Rosa Algar\u00edn, A., Demurjian, S.A.: An approach to facilitate security assurance for information sharing and exchange in big data applications. In: Akhgar, B., Arabnia, H.R. (eds.) Accepted in Emerging Trends in Information and Communication Technologies Security. Elsevier, Amsterdam (2013)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"334","DOI":"10.4018\/978-1-4666-4514-1.ch013","volume-title":"Architectures and Protocols for Secure Information Technology","author":"A De la Rosa Algar\u00edn","year":"2013","unstructured":"De la Rosa Algar\u00edn, A., Demurjian, S.A., Ziminski, T.B., et al.: Securing XML with role-based access control: case study in health care. In: Ruiz Mart\u00ednez, A., Pere\u00f1\u00edguez Garc\u00eda, F., Mar\u00edn L\u00f3pez, R. (eds.) Architectures and Protocols for Secure Information Technology, pp. 334\u2013365. IGI Global, Hershey (2013)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"De la Rosa Algar\u00edn, A., Demurjian, S. A., Berhe, S., et al.: A Security Framework for XML Schemas and Documents for Healthcare, pp. 782\u2013789 (2012)","DOI":"10.1109\/BIBMW.2012.6470239"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1197\/jamia.M1888","volume":"13","author":"RH Dolin","year":"2006","unstructured":"Dolin, R.H., Alschuler, L., Boyer, S., et al.: HL7 clinical document architecture, release 2. J. Am. Med. Inform. Assoc. 13, 30\u201339 (2006)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1126\/science.1196187","volume":"330","author":"D Estrin","year":"2010","unstructured":"Estrin, D., Sim, I.: Open mHealth architecture: an engine for health care innovation. Science 330, 759\u2013760 (2010). (Washington)","journal-title":"Science"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., et al.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4, 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Kuper, G., Massacci, F., Rassadko, N.: Generalized XML security views. In: SACMAT 2005: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pp. 77\u201384. ACM Press, New York (2005)","DOI":"10.1145\/1063979.1063994"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-12026-8_24","volume-title":"Database Systems for Advanced Applications","author":"E Leonardi","year":"2010","unstructured":"Leonardi, E., Bhowmick, S., Iwaihara, M.: Efficient database-driven evaluation of security clearance for federated access control of dynamic XML documents. In: Kitagawa, H., Ishikawa, Y., Li, Q., Watanabe, C. (eds.) DASFAA 2010. LNCS, vol. 5981, pp. 299\u2013306. Springer, Heidelberg (2010)"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1080\/19393550903249612","volume":"18","author":"T M\u00fcldner","year":"2009","unstructured":"M\u00fcldner, T., Leighton, G., Mizio\u0142ek, J.K.: Parameterized role-based access control policies for XML documents. Inf. Secur. J. A Globa. Persp. 18, 282\u2013296 (2009)","journal-title":"Inf. Secur. J. A Globa. Persp."},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/11557432_41","volume-title":"Model Driven Engineering Languages and Systems","author":"JA Pavlich-Mariscal","year":"2005","unstructured":"Pavlich-Mariscal, J.A., Michel, L., Demurjian, S.A.: A formal enforcement framework for role-based access control using aspect-oriented programming. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 537\u2013552. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Business Information Processing","Web Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44300-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T07:07:13Z","timestamp":1676876833000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44300-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662442999","9783662443002"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44300-2_2","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}