{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T14:40:51Z","timestamp":1761662451811,"version":"3.32.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,12,19]],"date-time":"2006-12-19T00:00:00Z","timestamp":1166486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2006,12,19]],"date-time":"2006-12-19T00:00:00Z","timestamp":1166486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1007\/s00778-006-0037-7","type":"journal-article","created":{"date-parts":[[2006,12,18]],"date-time":"2006-12-18T14:59:29Z","timestamp":1166453969000},"page":"371-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["The dynamic predicate: integrating access control with query processing in XML databases"],"prefix":"10.1007","volume":"16","author":[{"given":"Jae-Gil","family":"Lee","sequence":"first","affiliation":[]},{"given":"Kyu-Young","family":"Whang","sequence":"additional","affiliation":[]},{"given":"Wook-Shin","family":"Han","sequence":"additional","affiliation":[]},{"given":"Il-Yeol","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,19]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, G. et\u00a0al.: Enabling privacy for the paranoids. In: Proceedings of 30th International Conference on Very Large Data Bases, Toronto, Canada, pp. 708\u2013719, Aug.\/Sept. 2004","DOI":"10.1016\/B978-012088469-8\/50063-2"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R. et\u00a0al.: Hippocratic databases. In: Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 143\u2013154, Aug. 2002","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Al-Khalifa, S. et\u00a0al.: Structural joins: a primitive for efficient XML query pattern matching. In: Proceedings of 18th International Conference on Data Engineering, San Jose, California, pp. 141\u2013152, Feb. 2002","DOI":"10.1109\/ICDE.2002.994704"},{"issue":"2\u20133","key":"37_CR4","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1023\/A:1012809914301","volume":"17","author":"W.G. Aref","year":"2001","unstructured":"Aref W.G. and Ilyas I.F. (2001). SP-GiST: an extensible database index for supporting space partitioning trees. J. Intell. Inform. Syst. 17(2\u20133): 215\u2013240","journal-title":"J. Intell. Inform. Syst."},{"issue":"3","key":"37_CR5","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1023\/A:1019289831564","volume":"3","author":"E. Bertino","year":"2000","unstructured":"Bertino, E. et\u00a0al.: Specifying and enforcing access control policies for XML document sources. World Wide Web J. 3(3), 139\u2013151 (2000)","journal-title":"World Wide Web J."},{"key":"37_CR6","doi-asserted-by":"crossref","unstructured":"Bruno, N., Koudas, N., Srivastava, D.: Holistic twig joins: optimal XML pattern matching. In: Proceedings of 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, pp. 310\u2013321, June 2002","DOI":"10.1145\/564691.564727"},{"issue":"4","key":"37_CR7","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s10207-003-0020-x","volume":"1","author":"B. Carminati","year":"2003","unstructured":"Carminati B. and Ferrari E. (2003). Management of access control policies for XML document sources. Int. J. Inform. Sec. 1(4): 236\u2013260","journal-title":"Int. J. Inform. Sec."},{"key":"37_CR8","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E.: AC-XML documents: improving the performance of a web access control module. In: Proceedings of 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, pp. 67\u201376, June 2005","DOI":"10.1145\/1063979.1063993"},{"key":"37_CR9","doi-asserted-by":"crossref","unstructured":"Chien, S.-Y. et\u00a0al.: Efficient structural joins on indexed XML documents. In: Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 263\u2013274, Aug. 2002","DOI":"10.1016\/B978-155860869-6\/50031-7"},{"key":"37_CR10","doi-asserted-by":"crossref","unstructured":"Cho, S. et\u00a0al.: Optimizing the secure evaluation of twig queries. In: Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 490\u2013501, Aug. 2002","DOI":"10.1016\/B978-155860869-6\/50050-0"},{"key":"37_CR11","unstructured":"Clark, J., DeRose, S.: XML path language (XPath) Version 1.0, W3C Recommendation, Nov. 1999"},{"issue":"2","key":"37_CR12","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiani","year":"2002","unstructured":"Damiani, E. et\u00a0al.: A fine-grained access control system for XML documents. ACM Trans. Inform. Syst. Sec. 5(2), 169\u2013202 (2002)","journal-title":"ACM Trans. Inform. Syst. Sec."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: Proceedings of 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, pp. 587\u2013598, June 2004","DOI":"10.1145\/1007568.1007634"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: Proceedings of 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, pp. 61\u201369, June 2004","DOI":"10.1145\/990036.990046"},{"issue":"2","key":"37_CR15","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1145\/280277.280279","volume":"30","author":"V. Gaede","year":"1998","unstructured":"Gaede V. and Gunther O. (1998). Multidimensional access methods. ACM Comput. Surveys 30(2): 170\u2013231","journal-title":"ACM Comput. Surveys"},{"issue":"2","key":"37_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/152610.152611","volume":"25","author":"G. Graefe","year":"1993","unstructured":"Graefe G. (1993). Query evaluation techniques for large databases. ACM Comput. Surveys 25(2): 73\u2013170","journal-title":"ACM Comput. Surveys"},{"key":"37_CR17","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: Proceedings of 1984 ACM SIGMOD International Conference on Management of Data, Boston, Massachusetts, pp. 47\u201357, June 1984","DOI":"10.1145\/971697.602266"},{"issue":"2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/320248.320255","volume":"24","author":"G.R. Hjaltason","year":"1999","unstructured":"Hjaltason G.R. and Samet H. (1999). Distance browsing in spatial databases. ACM Trans. Database Syst. 24(2): 265\u2013318","journal-title":"ACM Trans. Database Syst."},{"key":"37_CR19","unstructured":"Li, Q., Moon, B.: Indexing and querying XML data for regular path expressions. In: Proceedings of 27th International Conference on Very Large Data Bases, Rome, Italy, pp. 361\u2013370, Sept. 2001"},{"key":"37_CR20","doi-asserted-by":"crossref","unstructured":"Luo, B. et\u00a0al.: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Proceedings of 2004 ACM CIKM International Conference on Information and Knowledge Management, Washington, DC, pp. 543\u2013552, Nov. 2004","DOI":"10.1145\/1031171.1031273"},{"issue":"2","key":"37_CR21","first-page":"313","volume":"19","author":"M.P. Marcus","year":"1993","unstructured":"Marcus M.P., Marcinkiewicz M.A. and Santorini B. (1993). Building a large annotated corpus of English: The Penn Treebank. Comput. Linguist. 19(2): 313\u2013330","journal-title":"Comput. Linguist."},{"issue":"1","key":"37_CR22","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/962446.962448","volume":"51","author":"G. Miklau","year":"2004","unstructured":"Miklau G. and Suciu D. (2004). Containment and equivalence for a fragment of XPath. J. ACM 51(1): 2\u201345","journal-title":"J. ACM"},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Murata, M., Tozawa, A., Kudo, M.: XML access control using static analysis. In: Proceedings of 10th ACM Conference on Computer and Communications Security, Washingtion, DC, pp. 73\u201384, Oct. 2003","DOI":"10.1145\/948109.948122"},{"key":"37_CR24","unstructured":"Information and Privacy Commissioner of Ontario, Intelligent Software Agents: Turning a Privacy Threat into a Privacy Protector, Apr. 1999"},{"key":"37_CR25","unstructured":"Information and Privacy Commissioner of Ontario, An Internet Privacy Primer: Assume Nothing, Aug. 2001"},{"key":"37_CR26","doi-asserted-by":"crossref","unstructured":"Qi, N., Kudo, M.: Access-condition-table-driven access control for XML database. In: Proceedings of 9th European Symposium on Research in Computer Security, French Riviera, France, pp. 17\u201332, Sept. 2004","DOI":"10.1007\/978-3-540-30108-0_2"},{"issue":"1","key":"37_CR27","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1145\/103140.103144","volume":"16","author":"F. Rabitti","year":"1991","unstructured":"Rabitti, F. et\u00a0al.: A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16(1), 88\u2013131 (1991)","journal-title":"ACM Trans. Database Syst."},{"key":"37_CR28","doi-asserted-by":"crossref","unstructured":"Ramanan, P.: Covering indexes for XML queries: bisimulation \u2013 Simulation = Negation. In: Proceedings of 29th International Conference on Very Large Data Bases, Berlin, pp. 165\u2013176, Sept. 2003","DOI":"10.1016\/B978-012722442-8\/50023-9"},{"issue":"2","key":"37_CR29","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1145\/356924.356930","volume":"16","author":"H. Samet","year":"1984","unstructured":"Samet H. (1984). The quadtree and related hierarchical data structures. ACM Comput. Surveys 16(2): 187\u2013260","journal-title":"ACM Comput. Surveys"},{"key":"37_CR30","doi-asserted-by":"crossref","unstructured":"Schmidt, A.R. et\u00a0al.: XMark: a benchmark for XML data management. In: Proceedings of 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 974\u2013985, Aug. 2002","DOI":"10.1016\/B978-155860869-6\/50096-2"},{"key":"37_CR31","unstructured":"Seeger, B., Kriegel,H.-P.: The buddy-tree: an efficient and robust access method for spatial data base systems. In: Proceedings of 16th International Conference on Very Large Data Bases, Queensland, Australia, pp. 590\u2013601, Aug. 1990"},{"key":"37_CR32","unstructured":"Whang, K.-Y., Krishnamurthy, R.: The multilevel grid file\u2014a dynamic hierarchical multidimensional file structure. In: of International Conference on Database for Advanced Applications, Tokyo, Japan, pp. 449\u2013459, Apr. 1991"},{"key":"37_CR33","doi-asserted-by":"crossref","unstructured":"Wu,Y., Patel, J.M., Jagadish H.V.: Structural join order selection for XML query optimization. In: Proceedings of 19th International Conference on Data Engineering, Bangalore, India, pp. 443\u2013454, Mar. 2003","DOI":"10.1109\/ICDE.2003.1260812"},{"issue":"2","key":"37_CR34","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1005566.1005570","volume":"29","author":"T. Yu","year":"2004","unstructured":"Yu, T. et\u00a0al.: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2), 363\u2013402 (2004)","journal-title":"ACM Trans. Database Syst."}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-006-0037-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00778-006-0037-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-006-0037-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-006-0037-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,12]],"date-time":"2025-01-12T15:00:39Z","timestamp":1736694039000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00778-006-0037-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,19]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,7]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1007\/s00778-006-0037-7","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"type":"print","value":"1066-8888"},{"type":"electronic","value":"0949-877X"}],"subject":[],"published":{"date-parts":[[2006,12,19]]},"assertion":[{"value":"30 September 2005","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2006","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2006","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2006","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}