{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:16:48Z","timestamp":1725718608889},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/hicss.2003.1174827","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T20:27:43Z","timestamp":1087936063000},"page":"10 pp.","source":"Crossref","is-referenced-by-count":3,"title":["XML access control for semantically related XML documents"],"prefix":"10.1109","author":[{"given":"V.","family":"Parmar","sequence":"first","affiliation":[]},{"family":"Hongchi Shi","sequence":"additional","affiliation":[]},{"family":"Su-Shing Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"ref11","first-page":"87","article-title":"XML document security based on provisional authorization","author":"kudo","year":"2000","journal-title":"Proceedings of the 7th ACM Conference on Computer and Communication Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319183"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/514183.514186"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/383775.383777"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372074"},{"journal-title":"W3C Extensible Markup Language (XML) 1 0","year":"0","key":"ref16"},{"journal-title":"W3C Simple Object Access Protocol (SOAP) 1 1","year":"0","key":"ref17"},{"journal-title":"W3C XML Path Language (XPATH) 1 0","year":"0","key":"ref18"},{"key":"ref19","first-page":"150","article-title":"A scalable XML access control system","author":"wang","year":"0","journal-title":"Proceeding (Poster) of the 10th International World Wide Web Conference (Hong Kong 2001)"},{"key":"ref4","article-title":"Specifying and enforcing access control policies for XML document sources","author":"bertino","year":"2001","journal-title":"Technical Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935172"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372152"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968827"},{"key":"ref8","first-page":"311","article-title":"Regulating access to XML documents","author":"gabillon","year":"2001","journal-title":"Proceedings of the 15th Annual IFIP WG 11 3 Working Conference on Database and Application Security"},{"journal-title":"DbXML DbXML Core Server","year":"0","key":"ref7"},{"journal-title":"Apache Apache Xerces2 Java Parser","year":"0","key":"ref2"},{"journal-title":"Apache Apache SOAP","year":"0","key":"ref1"},{"journal-title":"IMS Learner Information Package Specification","year":"0","key":"ref9"}],"event":{"name":"36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the","start":{"date-parts":[[2003,1,9]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2003,1,9]]}},"container-title":["36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8360\/26341\/01174827.pdf?arnumber=1174827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T23:23:11Z","timestamp":1489447391000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1174827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/hicss.2003.1174827","relation":{},"subject":[],"published":{"date-parts":[[2003]]}}}