{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T08:27:10Z","timestamp":1712305630817},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,4,8]],"date-time":"2012-04-08T00:00:00Z","timestamp":1333843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s00778-012-0273-y","type":"journal-article","created":{"date-parts":[[2012,4,8]],"date-time":"2012-04-08T06:39:14Z","timestamp":1333867154000},"page":"843-867","source":"Crossref","is-referenced-by-count":4,"title":["Consistency and repair for XML write-access control policies"],"prefix":"10.1007","volume":"21","author":[{"given":"Loreto","family":"Bravo","sequence":"first","affiliation":[]},{"given":"James","family":"Cheney","sequence":"additional","affiliation":[]},{"given":"Irini","family":"Fundulaki","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Segovia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,8]]},"reference":[{"key":"273_CR1","doi-asserted-by":"crossref","unstructured":"Arenas, M., Bertossi, L., Chomicki, J.: Consistent Query Answers in Inconsistent Databases, pp. 68\u201379. PODS, ACM Press, London (1999)","DOI":"10.1145\/303976.303983"},{"key":"273_CR2","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1016\/j.is.2008.01.005","volume":"33","author":"L. Bertossi","year":"2008","unstructured":"Bertossi L., Bravo L., Franconi E., Lopatenko A.: The complexity and approximation of fixing numerical attributes in databases under integrity constraints. Inf. Syst. 33, 407\u2013434 (2008)","journal-title":"Inf. Syst."},{"key":"273_CR3","first-page":"11:1","volume":"35","author":"G.J. Bex","year":"2010","unstructured":"Bex G.J., Neven F., Schwentick T., Vansummeren S.: Inference of concise regular expressions and DTDs. ACM Trans. Database Syst. 35, 11:1\u201311:47 (2010)","journal-title":"ACM Trans. Database Syst."},{"key":"273_CR4","doi-asserted-by":"crossref","unstructured":"Boneva, I., Caron, A.C., Groz, B., Roos, Y., Tison, S., Staworko, S.: View Update Translation for XML. In: ICDT, pp 42\u201353 (2011)","DOI":"10.1145\/1938551.1938560"},{"key":"273_CR5","unstructured":"Bravo, L., Cheney, J., Fundulaki, I.: Repairing Inconsistent XML Write-access Control Policies. DBPL, no. 4797 in LNCS, pp. 98\u2013112. Springer, Vienna (2007)"},{"key":"273_CR6","doi-asserted-by":"crossref","unstructured":"Bravo, L., Cheney, J., Fundulaki, I.: ACCOn: Checking Consistency of XML Write-access Control Policies. EDBT (demonstration), pp. 715\u2013719 (2008)","DOI":"10.1145\/1353343.1353433"},{"issue":"6","key":"273_CR7","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1016\/j.jcss.2009.02.001","volume":"75","author":"B. Cautis","year":"2009","unstructured":"Cautis B., Abiteboul S., Milo T.: Reasoning about XML update constraints. J. Comput. Syst. Sci. 75(6), 336\u2013358 (2009)","journal-title":"J. Comput. Syst. Sci."},{"key":"273_CR8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1287\/moor.4.3.233","volume":"4","author":"V. Chvatal","year":"1979","unstructured":"Chvatal V.: A Greedy Heuristic for the set covering problem. Math. Oper. Res. 4, 233\u2013235 (1979)","journal-title":"Math. Oper. Res."},{"key":"273_CR9","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"2001","unstructured":"Cormen T.H., Leiserson C.E., Rivest R.L., Stein C.: Introduction to Algorithms. MIT Press\/McGraw-Hill, Cambridge (2001)"},{"key":"273_CR10","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Access control models for XML. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 27\u201353. Springer, USA (2008)","DOI":"10.1007\/978-0-387-48533-1_2"},{"key":"273_CR11","doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.Y., Garofalakis, M.: Secure XML Querying with Security Views, pp. 587\u2013598. ACM SIGMOD, London (2004)","DOI":"10.1145\/1007568.1007634"},{"issue":"6","key":"273_CR12","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"R. Floyd","year":"1962","unstructured":"Floyd R.: Algorithm 97: Shortest path. Commun. ACM 5(6), 345 (1962)","journal-title":"Commun. ACM"},{"key":"273_CR13","doi-asserted-by":"crossref","unstructured":"Fundulaki, I., Maneth, S.: Formalizing XML Access Control for Update Operations. SACMAT, pp. 169\u2013174. ACM, London (2007)","DOI":"10.1145\/1266840.1266868"},{"key":"273_CR14","doi-asserted-by":"crossref","unstructured":"Harmar, A., Hills, R., Rosser, E., Jones, M., Buneman, O., Dunbar, D., Greenhill, S., Hale, V., Sharman, J., et\u00a0al: IUPHAR-DB: the IUPHAR database of G protein-coupled receptors and ion channels. Nucleic Acids Res 37:D680\u2013D685 (2009)","DOI":"10.1093\/nar\/gkn728"},{"key":"273_CR15","doi-asserted-by":"crossref","unstructured":"Jacquemard, F., Rusinowitch, M.: Rewrite-based Verification of XML Updates. PPDP, pp. 119\u2013130. ACM, London (2010)","DOI":"10.1145\/1836089.1836105"},{"issue":"7","key":"273_CR16","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1109\/TKDE.2005.111","volume":"17","author":"M. Jiang","year":"2005","unstructured":"Jiang M., Fu A.W.C: Integration and efficient lookup of compressed XML accessibility maps. IEEE Trans. Knowl. Data Eng. 17(7), 939\u2013953 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"273_CR17","doi-asserted-by":"crossref","unstructured":"Koromilas, L., Chinis, G., Fundulaki, I., Ioannidis, S.: Controlling access to XML documents over XML native and relational databases. In: Secure Data Management, Lecture Notes in Computer Science, vol 5776, pp. 122\u2013141. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-04219-5_8"},{"key":"273_CR18","doi-asserted-by":"crossref","unstructured":"Kuper, G., Massacci, F., Rassadko, N.: Generalized XML Security Views. SACMAT, pp. 77\u201384. ACM, London (2005)","DOI":"10.1145\/1063979.1063994"},{"issue":"3","key":"273_CR19","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1145\/1149114.1149117","volume":"7","author":"N. Leone","year":"2006","unstructured":"Leone N., Pfeifer G., Faber W., Eiter T., Gottlob G., Koch C., Mateis C., Perri S., Scarcello F.: The DLV system for knowledge representation and reasoning. ACM Trans. Comp. Logic 7(3), 499\u2013562 (2006)","journal-title":"ACM Trans. Comp. Logic"},{"key":"273_CR20","doi-asserted-by":"crossref","unstructured":"Lim, C.H., Park, S., Son, S.H.: Access control of XML documents considering update operations. In: ACM Workshop on XML Security pp. 49\u201359 (2003)","DOI":"10.1145\/968559.968568"},{"key":"273_CR21","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1007\/s00778-010-0202-x","volume":"20","author":"B. Luo","year":"2011","unstructured":"Luo B., Lee D., Lee W.C., Liu P.: QFilter: rewriting insecure XML queries to secure ones using nondeterministic finite automata. VLDB J. 20, 397\u2013415 (2011)","journal-title":"VLDB J."},{"issue":"3","key":"273_CR22","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/1166074.1166076","volume":"31","author":"W. Martens","year":"2006","unstructured":"Martens W., Neven F., Schwentick T., Bex G.J.: Expressiveness and complexity of XML schema. ACM Trans. Database Syst. 31(3), 770\u2013813 (2006)","journal-title":"ACM Trans. Database Syst."},{"issue":"3","key":"273_CR23","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.ic.2010.11.019","volume":"209","author":"N. Moore","year":"2011","unstructured":"Moore N.: Computational complexity of the problem of tree generation under fine-grained access control policies. Inf. Comput. 209(3), 548\u2013567 (2011)","journal-title":"Inf. Comput."},{"issue":"3","key":"273_CR24","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/1178618.1178621","volume":"9","author":"M. Murata","year":"2006","unstructured":"Murata M., Tozawa A., Kudo M., Hada S.: XML access control using static analysis. ACM TISSEC 9(3), 290\u2013331 (2006)","journal-title":"ACM TISSEC"},{"key":"273_CR25","volume-title":"Computational Complexity","author":"C. Papadimitriou","year":"1994","unstructured":"Papadimitriou C.: Computational Complexity. Addison- Wesley, Reading (1994)"},{"key":"273_CR26","unstructured":"Robie, J., Chamberlin, D., Dyck, M., Florescu, D., Melton, J., Simeon, J.: XQuery Update Facility 1.0. http:\/\/www.w3.org\/TR\/xquery-update-10\/ , W3C Recommendation (2011)"},{"issue":"9","key":"273_CR27","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"Saltzer J., Schroeder M.: The protection of information in computer systems. Proc. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"273_CR28","doi-asserted-by":"crossref","unstructured":"Schmidt, A., Waas, F., Kersten, M., Carey, M.J., Manolescu, I., Busse, R.: XMark: A Benchmark for XML Data Management. VLDB, pp. 974\u2013985 (2002)","DOI":"10.1016\/B978-155860869-6\/50096-2"},{"key":"273_CR29","unstructured":"Stoica, A., Farkas, C.: Secure XML Views. In: IFIP WG 11.3, vol. 256. Kluwer, Dordrecht (2002)"},{"key":"273_CR30","doi-asserted-by":"crossref","unstructured":"Yannakakis, M.: Node-and Edge-deletion NP-complete Problems. STOC, pp 253\u2013264. ACM Press, New york (1978)","DOI":"10.1145\/800133.804355"},{"issue":"2","key":"273_CR31","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1137\/0210021","volume":"10","author":"M. Yannakakis","year":"1981","unstructured":"Yannakakis M.: Edge-deletion problems. SIAM J. Comput. 10(2), 297\u2013309 (1981)","journal-title":"SIAM J. Comput."},{"issue":"2","key":"273_CR32","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1005566.1005570","volume":"29","author":"T. Yu","year":"2004","unstructured":"Yu T., Srivastava D., Lakshmanan L.V.S., Jagadish H.V.: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2), 363\u2013402 (2004)","journal-title":"ACM Trans. Database Syst."}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-012-0273-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-012-0273-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-012-0273-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,27]],"date-time":"2019-06-27T01:22:42Z","timestamp":1561598562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-012-0273-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,8]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["273"],"URL":"https:\/\/doi.org\/10.1007\/s00778-012-0273-y","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,8]]}}}