{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T22:24:28Z","timestamp":1648506268067},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1007\/s11390-007-9012-z","type":"journal-article","created":{"date-parts":[[2007,2,9]],"date-time":"2007-02-09T18:31:12Z","timestamp":1171045872000},"page":"44-53","source":"Crossref","is-referenced-by-count":1,"title":["CSchema: A Downgrading Policy Language for XML Access Control"],"prefix":"10.1007","volume":"22","author":[{"given":"Dong-Xi","family":"Liu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,14]]},"reference":[{"key":"9012_CR1","doi-asserted-by":"crossref","unstructured":"Wenfei Fan, Chee-Yong Chan, Minos Garofalakis. Secure XML querying with security views. In Proc. the 2004 ACM Int. Conf. Management of Data, Paris, France, 2004, pp. 587\u2013598.","DOI":"10.1145\/1007568.1007634"},{"key":"9012_CR2","doi-asserted-by":"crossref","unstructured":"Damiani E, di Vimercati S, Paraboschi S et al. Securing XML documents. In Proc. Int. Conf. Extending Database Technology, Konstanz, Germany, 2000, LNCS 1777, pp. 121\u2013135.","DOI":"10.1007\/3-540-46439-5_8"},{"issue":"2","key":"9012_CR3","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E Damiani","year":"2002","unstructured":"Damiani E, di Vimercati S, Paraboschi S et al. A fine-grained access control system for XML documents. ACM Trans. Information and System Security, 2002, 5(2): 2: 169\u2013202.","journal-title":"ACM Trans. Information and System Security"},{"issue":"3","key":"9012_CR4","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E Bertino","year":"2002","unstructured":"Bertino E, Ferrari E. Secure and selective dissemination of XML documents. ACM Trans. Information and System Security, 2002, 5(3): 290\u2013331.","journal-title":"ACM Trans. Information and System Security"},{"key":"9012_CR5","doi-asserted-by":"crossref","unstructured":"Gabilon A, Bruno E. Regulating access to XML documents. In Working Conf. Database and Application Security, Ontario, Canada, 2001, pp. 299\u2013314.","DOI":"10.1007\/978-0-387-35587-0_21"},{"key":"9012_CR6","doi-asserted-by":"crossref","unstructured":"Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada. XML access control using static analysis. In Proc. 10th ACM Conf. Computer and Communications Security, Washington DC, USA, 2003, pp. 73\u201384.","DOI":"10.1145\/948109.948122"},{"key":"9012_CR7","unstructured":"Hada S, Kudo M. XML access control language: Provisional authorization for XML documents. 2000, http:\/\/www.trl.ibm.com\/projects\/xml\/xacl ."},{"key":"9012_CR8","unstructured":"Godik S, Moses T. eXtensible access control markup 2 language (XACML) Version 1.0. 2003, http:\/\/www.oasis-open.org\/specs\/index.php ."},{"key":"9012_CR9","doi-asserted-by":"crossref","unstructured":"Irini Fundulaki, Maarten Marx. Specifying access control policies for XML documents with XPath. In Proc. the 9th ACM Symp. Access Control Models and Technologies, New York, USA, 2004, pp. 61\u201369.","DOI":"10.1145\/990036.990046"},{"key":"9012_CR10","doi-asserted-by":"crossref","unstructured":"Stephen Chong, Andrew C Myers. Security policies for downgrading. In Proc. the 11th ACM Conf. Computer and Communications Security, Washington DC, USA, 2004, pp. 198\u2013209.","DOI":"10.1145\/1030083.1030110"},{"key":"9012_CR11","doi-asserted-by":"crossref","unstructured":"Veronique Benzaken, Giuseppe Castagna, Alain Frisch. CDuce: An XML-centric general-purpose language. In Proc. the 8th Int. Conf. Functional Programming, Uppsala, Sweden, 2003, pp. 51\u201363.","DOI":"10.1145\/944746.944711"},{"key":"9012_CR12","doi-asserted-by":"crossref","unstructured":"Jerome Simeon, Philip Wadler. The essence of XML. In Proc. the 30th ACM Symp. Principles of Programming Languages, New Orleans, Louisiana, USA, 2003, pp. 1\u201313.","DOI":"10.1145\/604131.604132"},{"issue":"2","key":"9012_CR13","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/767193.767195","volume":"3","author":"H Hosoya","year":"2003","unstructured":"Hosoya H, Pierce B C. XDuce: A typed XML processing language. ACM Trans. Internet Technology, 2003, 3(2): 117\u2013148.","journal-title":"ACM Trans. Internet Technology"},{"key":"9012_CR14","doi-asserted-by":"crossref","unstructured":"Dario Colazzo, Giorgio Ghelli, Paolo Manghi, Carlo Sartiani. Types for path correctness of XML queries. In Proc. the 9th ACM Int. Conf. Functional Programming, Snowbird, USA, 2004, pp. 126\u2013137.","DOI":"10.1145\/1016848.1016869"},{"key":"9012_CR15","doi-asserted-by":"crossref","unstructured":"Haruo Hosoya, Jerome Vouillon, Benjamin C Pierce. Regular expression types for XML. In Proc. the 5th ACM Int. Conf. Functional Programming, Montreal, Canada, 2000, pp. 11\u201322.","DOI":"10.1145\/357766.351242"},{"key":"9012_CR16","doi-asserted-by":"crossref","unstructured":"Dongxi Liu, Zhenjiang Hu, Masato Takeichi. An environment for maintaining computation dependency in XML documents. In Proc. the 2005 ACM Symp. Document Engineering, Bristol, UK, 2005, pp. 42\u201351.","DOI":"10.1145\/1096601.1096616"},{"key":"9012_CR17","unstructured":"W3C Recommendation. XML Query (XQuery). 2005, http:\/\/www.w3.org\/XML\/Query ."},{"key":"9012_CR18","doi-asserted-by":"crossref","unstructured":"Bierman G, Meijer E, Schulte W. The essence of data access in Comega. In European Conf. Object-Oriented Programming, LNCS 3586, Glasgow, UK, 2005, pp. 287\u2013311.","DOI":"10.1007\/11531142_13"},{"key":"9012_CR19","unstructured":"The Galax Team. Galax: An Implementation of XQuery. http:\/\/www.galaxquery.org ."},{"key":"9012_CR20","unstructured":"Mary Fernandez, Jerome Simeon. Build your own XQuery processor. In EDBT Summer School, Sardinia, Italy, 2004."},{"key":"9012_CR21","doi-asserted-by":"crossref","unstructured":"Serge Abiteboul, Omar Benjelloun, Tova Milo. Positive active XML. In Proc. the 23rd ACM Symp. Principles of Database Systems, Paris, France, 2004, pp. 35\u201345.","DOI":"10.1145\/1055558.1055564"},{"key":"9012_CR22","doi-asserted-by":"crossref","unstructured":"Schneider F B, Morrisett G, Harperi R. A language-based approach to security. Informatics: 10 Years Back, 10 Years Ahead, LNCS 2000, Springer-Verlag, 2000, pp. 86\u2013101.","DOI":"10.1007\/3-540-44577-3_6"},{"key":"9012_CR23","doi-asserted-by":"crossref","unstructured":"George C Necula. Proof-carrying code. In Proc. the 24th ACM Symp. Principles of Programming Languages, Paris, France, 1997, pp. 106\u2013119.","DOI":"10.1145\/263699.263712"},{"key":"9012_CR24","doi-asserted-by":"crossref","unstructured":"Cedric Fournet, Andrew D Gordon. Stack inspection: Theory and variants. In Proc. the 29th ACM Symp. Principles of Programming Languages, Portland, Oregon, USA, 2002, pp. 307\u2013318.","DOI":"10.1145\/565816.503301"},{"key":"9012_CR25","doi-asserted-by":"crossref","unstructured":"Peng Li, Steve Zdancewic. Downgrading policies and relaxed noninterference. In Proc. ACM Symp. Principles of Programming Languages, Long Beach, California, 2005, pp. 158\u2013170.","DOI":"10.1145\/1040305.1040319"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9012-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-007-9012-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-007-9012-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:32:38Z","timestamp":1559399558000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-007-9012-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["9012"],"URL":"https:\/\/doi.org\/10.1007\/s11390-007-9012-z","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}