{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T05:42:26Z","timestamp":1778305346840,"version":"3.51.4"},"reference-count":17,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2002,12,1]],"date-time":"2002-12-01T00:00:00Z","timestamp":1038700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data &amp; Knowledge Engineering"],"published-print":{"date-parts":[[2002,12]]},"DOI":"10.1016\/s0169-023x(02)00127-1","type":"journal-article","created":{"date-parts":[[2002,10,7]],"date-time":"2002-10-07T19:24:03Z","timestamp":1034018643000},"page":"237-260","source":"Crossref","is-referenced-by-count":27,"title":["Protection and administration of XML data sources"],"prefix":"10.1016","volume":"43","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Silvana","family":"Castano","sequence":"additional","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mesiti","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S0169-023X(02)00127-1_BIB1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/4236.935172","article-title":"Author-X: a comprehensive system for securing XML documents","volume":"5","author":"Bertino","year":"2001","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB2","doi-asserted-by":"crossref","unstructured":"E. Bertino, S. Castano, E. Ferrari, On specifying security policies for Web documents with an XML-based language, in: Proc. of SACMAT\u20192001, ACM Symposium on Access Control Models and Technologies, Fairfax, VA, 2001","DOI":"10.1145\/373256.373264"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB3","doi-asserted-by":"crossref","unstructured":"E. Bertino, S. Castano, E. Ferrari, Securing XML documents: the Author-X project demonstration, in: Proc. of the SIGMOD 2001 Conference, Santa Barbara, CA, 2001","DOI":"10.1145\/375663.375764"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB4","doi-asserted-by":"crossref","unstructured":"E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, Securing XML documents, in: Proc. of Int\u2019l Conference on Extending Database Technology, Konstanz, Germany, 2000","DOI":"10.1007\/3-540-46439-5_8"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB5","doi-asserted-by":"crossref","unstructured":"A. Deutsch, M. Fernandez, D. Florescu, A. Levy, D. Suciu, A query language for XML, in: Proc. Int\u2019l Conference on World Wide Web, Toronto, Canada, 1999","DOI":"10.1016\/S1389-1286(99)00020-1"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB6","unstructured":"C. Geuer Pollmann, The XML security page. Available from <http:\/\/www.nue.et-inf.uni-siegen.de\/\u223cgeuer-pollmann\/>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB7","unstructured":"Object Design Inc., An XML data server for building enterprise Web applications, 1998, White paper. Available from <http:\/\/www.odi.com\/excelon>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB8","unstructured":"PROJECTX Parser, Sun. Available from <http:\/\/java.sun.com\/products\/xml>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB9","unstructured":"J. Robbie, XQL\u201999 Proposal, 1999. Available from <http:\/\/metalab.unc.edu\/xql\/>"},{"issue":"4","key":"10.1016\/S0169-023X(02)00127-1_BIB10","first-page":"555","article-title":"An authorization model for a distributed hypertext system","volume":"8","author":"Samarati","year":"1996","journal-title":"IEEE TKDE"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB11","unstructured":"Sigmod Record XML Database. Available from <http:\/\/www.dia.uniroma3.it\/Araneus\/Sigmod\/>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB12","series-title":"Network Security Essentials: Applications and Standards","author":"Stallings","year":"2000"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB13","article-title":"Using digital credentials on the World Wide Web","volume":"7","author":"Winslett","year":"1997","journal-title":"Journal of Computer Security"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB14","unstructured":"W3C, XML Path Language (Xpath), 1999. Available from <http:\/\/www.w3.org\/TR\/xpath>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB15","unstructured":"W3C, Extensible Markup Language, 1998. Available from <http:\/\/www.w3.org\/XML>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB16","unstructured":"W3C, Document Object Model, 1998. Available from <http:\/\/www.w3.org\/DOM\/>"},{"key":"10.1016\/S0169-023X(02)00127-1_BIB17","unstructured":"XERCES Parser, Apache. Available from <http:\/\/www.xml.apache.org>"}],"container-title":["Data &amp; Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001271?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169023X02001271?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T02:23:02Z","timestamp":1554776582000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169023X02001271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,12]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2002,12]]}},"alternative-id":["S0169023X02001271"],"URL":"https:\/\/doi.org\/10.1016\/s0169-023x(02)00127-1","relation":{},"ISSN":["0169-023X"],"issn-type":[{"value":"0169-023X","type":"print"}],"subject":[],"published":{"date-parts":[[2002,12]]}}}