{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:30:46Z","timestamp":1725557446190},"reference-count":17,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cmpsac.2003.1245408","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"633-638","source":"Crossref","is-referenced-by-count":8,"title":["Security issues for the semantic Web"],"prefix":"10.1109","author":[{"given":"B.","family":"Thuraisingham","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"15"},{"year":"0","key":"16"},{"journal-title":"XML Databases and the Semantic Web","year":"2001","author":"thuraisingham","key":"13"},{"key":"14","article-title":"The Semantic Web","author":"thuraisingham","year":"2003","journal-title":"Encyclopedia of Human Computer Interaction"},{"journal-title":"Data Mining Technologies Techniques Tools and Trends","year":"1998","author":"thuraisingham","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2002.1045130"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067741"},{"key":"2","article-title":"Secure Third Party Publication of XML Documents","author":"bertino","year":"0","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1","article-title":"Access Control for XML Documents","author":"bertino","year":"2002","journal-title":"Data and Knowledge Engineering"},{"journal-title":"Data Management Systems Evolution and Interoperation","year":"1997","author":"thuraisingham","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/96602.96604"},{"journal-title":"Resource Description Framework","year":"0","key":"6"},{"journal-title":"XML","year":"2000","author":"st laurent","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0501-34"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/69.382297"},{"journal-title":"Computers and Security","article-title":"Security Issues for Federated Database Systems","year":"1994","key":"8"}],"event":{"name":"27th Annual International Computer Software and Applications Conference","acronym":"CMPSAC-03","location":"Dallas, TX, USA"},"container-title":["Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8813\/27898\/01245408.pdf?arnumber=1245408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T14:50:46Z","timestamp":1489416646000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1245408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cmpsac.2003.1245408","relation":{},"subject":[]}}