{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T15:40:20Z","timestamp":1761925220858,"version":"build-2065373602"},"reference-count":28,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s0169-023x(02)00126-x","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T19:24:03Z","timestamp":1034018643000},"page":"293-315","source":"Crossref","is-referenced-by-count":8,"title":["Protecting deductive databases from unauthorized retrieval and update requests"],"prefix":"10.1016","volume":"43","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]}],"member":"78","reference":[{"year":"1995","series-title":"Foundations of Databases","author":"Abiteboul","key":"10.1016\/S0169-023X(02)00126-X_BIB1"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB2","doi-asserted-by":"crossref","unstructured":"S. Barker, Data protection by logic programming, in: J. Lloyd et al. (Eds.), Proceedings of the 1st International Conference on Computational Logic, Imperial College London, Lecture Notes in Artificial Intelligence, vol. 1861, Springer, Berlin, 2000, pp. 1300\u20131313","DOI":"10.1007\/3-540-44957-4_87"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB3","series-title":"Data and Applications Security","first-page":"185","article-title":"Protecting deductive databases from unauthorized retrievals","author":"Barker","year":"2001"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB4","doi-asserted-by":"crossref","unstructured":"S. Barker, Secure deductive databases, in: I.V. Ramakhrishnan (Ed.), in: Proceedings of the 3rd International Symposium on Practical Applications of Declarative Languages (PADL\u201901), Las Vegas, Lecture Notes in Computer Science, vol. 1990, Springer, Berlin, 2001, pp. 123\u2013137","DOI":"10.1007\/3-540-45241-9_9"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB5","doi-asserted-by":"crossref","unstructured":"S. Barker, TRBACN: A temporal authorization model, in: V. Gorodetski, V. Skormin, L. Popyak (Eds.), Proceedings of the MMMANCS International Workshop on Network Security, St. Petersburg, Lecture Notes in Computer Science, vol. 2052, Springer, Berlin, 2001, pp. 178\u2013188","DOI":"10.1007\/3-540-45116-1_19"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB6","series-title":"Data and Applications Security","first-page":"167","article-title":"Flexible security policies in SQL","author":"Barker","year":"2002"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB7","doi-asserted-by":"crossref","unstructured":"S. Barker, Access control for deductive databases by logic programming, in: Proceedings of the 18th ICLP, Springer, Berlin, 2002, pp. 52\u201366","DOI":"10.1007\/3-540-45619-8_5"},{"issue":"3","key":"10.1016\/S0169-023X(02)00126-X_BIB8","first-page":"406","article-title":"Foundations of secure deductive databases","volume":"7","author":"Bonatti","year":"1995","journal-title":"IEEE TKDE"},{"year":"1995","series-title":"Database Security","author":"Castano","key":"10.1016\/S0169-023X(02)00126-X_BIB9"},{"issue":"1","key":"10.1016\/S0169-023X(02)00126-X_BIB10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/227595.227597","article-title":"Tabled evaluation with delaying for general logic programs","volume":"43","author":"Chen","year":"1996","journal-title":"Journal of the ACM"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB11","doi-asserted-by":"crossref","unstructured":"F. Cuppens, R. Demolombe, A modal logical framework for security policies, in: Z. Ras, A. Skowron (Eds.), 10th International Symposium on Foundations of Intelligent Information Systems, Lecture Notes in Computer Science, vol. 1325, Springer, Berlin, 1997, pp. 579\u2013589","DOI":"10.1007\/3-540-63614-5_56"},{"year":"2000","series-title":"An Introduction to Database Systems","author":"Date","key":"10.1016\/S0169-023X(02)00126-X_BIB12"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB13","unstructured":"H. Decker, M. Celma, A slick procedure for integrity checking in deductive databases, in: Proceedings of the 11th ICLP, MIT Press, 1994, pp. 456\u2013469"},{"year":"1988","series-title":"Knowledge in Flux: Modeling the Dynamics of Epistemic States","author":"Gardenfors","key":"10.1016\/S0169-023X(02)00126-X_BIB14"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB15","doi-asserted-by":"crossref","unstructured":"S. Jajodia, P. Samarati, V. Subrahmanian, A logical language for expressing authorizations, in: Proceedings of the IEEE Symposium on Security and Privacy, 1997, pp. 94\u2013107","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB16","doi-asserted-by":"crossref","unstructured":"H. Jamil, Belief reasoning in MLS deductive databases, in: ACM SIGMOD\u201999, 1999, pp. 109\u2013120","DOI":"10.1145\/304182.304192"},{"issue":"6","key":"10.1016\/S0169-023X(02)00126-X_BIB17","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","article-title":"Aductive logic programming","volume":"2","author":"Kakas","year":"1992","journal-title":"Journal of Logic and Computation"},{"year":"1987","series-title":"Foundations of Logic Programming","author":"LLoyd","key":"10.1016\/S0169-023X(02)00126-X_BIB18"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB19","doi-asserted-by":"crossref","unstructured":"J. Minker, Logic and databases: A 20 year retrospective, in: Proceedings of the 1st International Workshop on Logic in Databasess, Lecture Notes in Computer Science, vol. 1154, Springer, Berlin, 1996, pp. 3\u201357","DOI":"10.1007\/BFb0031734"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB20","unstructured":"T. Przymusinski, Perfect model semantics, in: Proceedings of the 5th ICLP, MIT Press, 1988, pp. 1081\u20131096"},{"year":"1995","series-title":"Applications of Logic Databases","author":"Ramakrishnan","key":"10.1016\/S0169-023X(02)00126-X_BIB21"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB22","doi-asserted-by":"crossref","unstructured":"R. Sandhu, D. Ferraiolo, R. Kuhn, The NIST model for role-based access control: towards a unified standard, in: Proceedings of the 4th ACM Workshop on Role-Based Access Control, 2000, pp. 47\u201361","DOI":"10.1145\/344287.344301"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB23","doi-asserted-by":"crossref","unstructured":"R. Sandhu, V. Bhamidipati, E. Coyne, S. Ganta, C. Youman, The ARBAC97 model for role-based administration of roles: preliminary description and outline, in: Proceedings of the 1st ACM Workshop on Role-Based Access Control, 1997, pp. 41\u201349","DOI":"10.1145\/266741.266752"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB24","unstructured":"K. Sagonas, T. Swift, D. Warren, J. Freire, P. Rao, The XSB System, Version 2.0, Programmer\u2019s Manual, 1999"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB25","doi-asserted-by":"crossref","unstructured":"M. Stonebraker, Implementation of integrity constraints and views by query modification, in: Proceedings of the SIGMOD Workshop on Management of Data, 1975, pp. 65\u201378","DOI":"10.1145\/500080.500091"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB26","unstructured":"J. Ullman, Principles of Database and Knowledge-Base Systems, vol. 1, Computer Science Press, Rockville, MD, 1988"},{"issue":"3","key":"10.1016\/S0169-023X(02)00126-X_BIB27","first-page":"620","article-title":"The well-founded semantics for general logic programs","volume":"38","author":"van Gelder","year":"1990","journal-title":"Journal of the ACM"},{"key":"10.1016\/S0169-023X(02)00126-X_BIB28","doi-asserted-by":"crossref","unstructured":"M. Vardi, The complexity of query languages, in: ACM Symposium on the Theory of Computing, 1982, pp. 137\u2013146","DOI":"10.1145\/800070.802186"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X0200126X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X0200126X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T08:01:57Z","timestamp":1733817717000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X0200126X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S0169023X0200126X"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(02)00126-x","relation":{},"ISSN":["0169-023X"],"issn-type":[{"type":"print","value":"0169-023X"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}