{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:05:47Z","timestamp":1746072347696,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642379956"},{"type":"electronic","value":"9783642379963"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37996-3_6","type":"book-chapter","created":{"date-parts":[[2013,4,8]],"date-time":"2013-04-08T04:36:22Z","timestamp":1365395782000},"page":"81-96","source":"Crossref","is-referenced-by-count":3,"title":["Protect Your RDF Data!"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"Kirrane","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Lopes","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Mileo","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Decker","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1049\/iet-ifs.2009.0198","volume":"4","author":"M. Amini","year":"2010","unstructured":"Amini, M., Jalili, R.: Multi-level authorisation model and framework for distributed semantic-aware environments. IET Information Security\u00a04(4), 301 (2010)","journal-title":"IET Information Security"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-04581-3_4","volume-title":"Semantic Techniques for the Web","author":"P.A. Bonatti","year":"2009","unstructured":"Bonatti, P.A., De Coi, J.L., Olmedilla, D., Sauro, L.: Rule-based policy representations and reasoning. In: Bry, F., Ma\u0142uszy\u0144ski, J. (eds.) Semantic Techniques for the Web. LNCS, vol.\u00a05500, pp. 201\u2013232. Springer, Heidelberg (2009)"},{"unstructured":"Bradshaw, J.M., Dutfield, S., Benoit, P., Woolley, J.D.: KAoS: Toward an industrial-strength open agent architecture. In: Software Agents (1997)","key":"6_CR3"},{"doi-asserted-by":"crossref","unstructured":"Costabello, L., Villata, S., Delaforge, N.: Linked data access goes mobile: Context-aware authorization for graph stores. In: LDOW - 5th WWW Workshop on Linked Data on the Web (2012), http:\/\/hal.archives-ouvertes.fr\/hal-00691256\/","key":"6_CR4","DOI":"10.3233\/978-1-61499-098-7-282"},{"unstructured":"Cyganiak, R., Harth, A., Hogan, A.: N-Quads: Enxtending N-Triples with Context (2009)","key":"6_CR5"},{"unstructured":"Das, S., Sundara, S., Cyganiak, R.: R2RML: RDB to RDF Mapping Language. Candidate Recommendation, W3C (February 2012)","key":"6_CR6"},{"unstructured":"Evered, M.: A case study in access control requirements for a health information system. In: Second Workshop on Australasian Information Security (2004)","key":"6_CR7"},{"issue":"3","key":"6_CR8","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1145\/320473.320482","volume":"1","author":"P.P. Griffiths","year":"1976","unstructured":"Griffiths, P.P.: An authorization mechanism for a relational database system. ACM Transactions on Database Systems\u00a01(3), 242\u2013255 (1976)","journal-title":"ACM Transactions on Database Systems"},{"unstructured":"Javanmardi, S., Amini, M., Jalili, R., GanjiSaffar, Y.: SBAC: A Semantic-Based Access Control Model. In: 11th Nordic Workshop on Secure IT-systems (NordSec 2006), Link\u00f6ping, Sweden (2006)","key":"6_CR9"},{"doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T.: A policy language for a pervasive computing environment. In: Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 63\u201374. IEEE Comput. Soc. (2003)","key":"6_CR10","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1007\/978-3-642-17746-0_33","volume-title":"The Semantic Web \u2013 ISWC 2010","author":"N. Lopes","year":"2010","unstructured":"Lopes, N., Polleres, A., Straccia, U., Zimmermann, A.: AnQL: SPARQLing Up Annotated RDFS. In: Patel-Schneider, P.F., Pan, Y., Hitzler, P., Mika, P., Zhang, L., Pan, J.Z., Horrocks, I., Glimm, B. (eds.) ISWC 2010, Part I. LNCS, vol.\u00a06496, pp. 518\u2013533. Springer, Heidelberg (2010)"},{"unstructured":"Lopes, N., Bischof, S., Decker, S., Polleres, A.: On the Semantics of Heterogeneous Querying of Relational, XML and RDF Data with XSPARQL. In: Moura, P., Nogueira, V.B. (eds.) EPIA 2011 \u2013 COLA Track, Lisbon, Portugal (October 2011)","key":"6_CR12"},{"unstructured":"Lopes, N., Kirrane, S., Zimmermann, A., Polleres, A., Mileo, A.: A Logic Programming approach for Access Control over RDF. In: Technical Communications of ICLP 2012, vol.\u00a017, pp. 381\u2013392. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik (2012)","key":"6_CR13"},{"doi-asserted-by":"crossref","unstructured":"McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the pale of MAC and DAC-defining new forms of access control. In: Proceedings of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 190\u2013200. IEEE (1990)","key":"6_CR14","DOI":"10.1109\/RISP.1990.63850"},{"doi-asserted-by":"crossref","unstructured":"Qin, L., Atluri, V.: Concept-level access control for the Semantic Web. In: Proceedings of the 2003 ACM Workshop on XML Security - XMLSEC 2003, p. 94. ACM Press (2003)","key":"6_CR15","DOI":"10.1145\/968559.968575"},{"doi-asserted-by":"crossref","unstructured":"Ryutov, T., Kichkaylo, T., Neches, R.: Access Control Policies for Semantic Networks. In: 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 150\u2013157. IEEE (July 2009)","key":"6_CR16","DOI":"10.1109\/POLICY.2009.11"},{"doi-asserted-by":"crossref","unstructured":"Sacco, O., Passant, A., Decker, S.: An Access Control Framework for the Web of Data. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 456\u2013463 (November 2011)","key":"6_CR17","DOI":"10.1109\/TrustCom.2011.59"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/3-540-45608-2_3","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2001","unstructured":"Samarati, P., de Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.\u00a02171, pp. 137\u2013196. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R.S.: Role-based access control. In: Advances in Computers, pp. 554\u2013563 (1998)","key":"6_CR19","DOI":"10.1016\/S0065-2458(08)60206-5"},{"unstructured":"Seaborne, A., Prud\u2019hommeaux, E.: SPARQL Query Language for RDF. W3C Recommendation, W3C (January 2008), http:\/\/www.w3.org\/TR\/rdf-sparql-query\/","key":"6_CR20"},{"doi-asserted-by":"crossref","unstructured":"Stephens, S.: The Enterprise Semantic Web. In: Cardoso, J., Hepp, M., Lytras, M.D. (eds.) The Semantic Web: Real-World Applications from Industry. Semantic Web and Beyond Computing for Human Experience, vol.\u00a06, pp. 17\u201337. Springer (2007)","key":"6_CR21","DOI":"10.1007\/978-0-387-48531-7_2"},{"issue":"2","key":"6_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1656242.1656245","volume":"11","author":"O. Udrea","year":"2010","unstructured":"Udrea, O., Recupero, D.R., Subrahmanian, V.S.: Annotated RDF. ACM Trans. Comput. Logic\u00a011(2), 1\u201341 (2010)","journal-title":"ACM Trans. Comput. Logic"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.websem.2011.08.006","volume":"11","author":"A. Zimmermann","year":"2012","unstructured":"Zimmermann, A., Lopes, N., Polleres, A., Straccia, U.: A General Framework for Representing, Reasoning and Querying with Annotated Semantic Web Data. J. Web Sem.\u00a011, 72\u201395 (2012)","journal-title":"J. Web Sem."}],"container-title":["Lecture Notes in Computer Science","Semantic Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37996-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T03:30:54Z","timestamp":1745983854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37996-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642379956","9783642379963"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37996-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}