{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T01:10:08Z","timestamp":1772845808267,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJIS"],"published-print":{"date-parts":[[2004,10]]},"DOI":"10.1007\/s10207-004-0032-1","type":"journal-article","created":{"date-parts":[[2004,5,18]],"date-time":"2004-05-18T08:05:28Z","timestamp":1084867528000},"page":"14-27","source":"Crossref","is-referenced-by-count":50,"title":["Controlled query evaluation for enforcing confidentiality in complete information systems"],"prefix":"10.1007","volume":"3","author":[{"given":"Joachim","family":"Biskup","sequence":"first","affiliation":[]},{"given":"Piero","family":"Bonatti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,10,1]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0169-023X(99)00043-9","volume":"33","author":"Biskup","year":"2000","unstructured":"Biskup J (2000) For unknown secrecies refusal is better than lying. Data Knowl Eng 33:1\u201323","journal-title":"Data Knowl Eng"},{"key":"32_CR2","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0169-023X(01)00024-6","volume":"38","author":"Biskup","year":"2001","unstructured":"Biskup J, Bonatti PA (2001) Lying versus refusal for known potential secrets. Data Knowl Eng 38:199\u2013222","journal-title":"Data Knowl Eng"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Biskup J, Bonatti PA (2002) Controlled query evaluation for known policies by combining lying and refusal. In: Proceedings of the 2nd international symposium on the foundations of information and knowledge systems (FoIKS 02), Schloss Salzau, February 2002. Lecture notes in computer science, vol 2284. Springer, Berlin Heidelberg New York, pp 49\u201366","DOI":"10.1007\/3-540-45758-5_4"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Biskup J, Bonatti PA (2002) Confidentiality policies and their enforcement for controlled query evaluation. In: Proceedings of the 7th European symposium on research in computer security (ESORICS 02), Zurich, October 2002. Lecture notes in computer science, vol 2502, Springer, Berlin Heidelberg New York, pp 39\u201354","DOI":"10.1007\/3-540-45853-0_3"},{"key":"32_CR5","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"Bonatti","year":"1995","unstructured":"Bonatti PA, Kraus S, Subrahmanian VS (1995) Foundations of secure deductive databases. IEEE Trans Knowl Data Eng 7(3):406\u2013422","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"32_CR6","unstructured":"Castano S, Fugini M, Martella G, Samarati P (1994) Database security. Addison-Wesley, Reading, MA"},{"key":"32_CR7","unstructured":"Denning DE (1982) Cryptography and data security. Addison-Wesley, Reading, MA"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Lloyd JW (1987) Foundations of logic programming. Springer, Berlin Heidelberg New York","DOI":"10.1007\/978-3-642-83189-8"},{"key":"32_CR9","unstructured":"Shoenfield JR (1967) Mathematical logic. Addison-Wesley, Reading, MA"},{"key":"32_CR10","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/319830.319833","volume":"8","author":"Sicherman","year":"1983","unstructured":"Sicherman GL, de Jonge W, van de Riet RP (1983) Answering queries without revealing secrets. ACM Trans Database Sys 8(1):41\u201359","journal-title":"ACM Trans Database Sys"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0032-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-004-0032-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-004-0032-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T07:01:21Z","timestamp":1559113281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-004-0032-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,10]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s10207-004-0032-1","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,10]]}}}