{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:10Z","timestamp":1729616650532,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/isias.2013.6947746","type":"proceedings-article","created":{"date-parts":[[2014,11,12]],"date-time":"2014-11-12T17:39:11Z","timestamp":1415813951000},"page":"13-18","source":"Crossref","is-referenced-by-count":1,"title":["Flexibility vs. security in linked enterprise data access control graphs"],"prefix":"10.1109","author":[{"given":"Markus","family":"Graube","sequence":"first","affiliation":[]},{"given":"Patricia","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Carnerero","sequence":"additional","affiliation":[]},{"given":"Oscar","family":"Lazaro","sequence":"additional","affiliation":[]},{"given":"Mikel","family":"Uriarte","sequence":"additional","affiliation":[]},{"given":"Leon","family":"Urbas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375624"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2013.6647948"},{"key":"12","article-title":"Beyond appchaining: Mobile app orchestration for efficient model driven software generation","volume":"2012","author":"ziegler","year":"0","journal-title":"Proc of 17th Int IEEE Con! on Emerging Technologies & Factory Automation (ETFA"},{"key":"3","article-title":"Policy based access control for a rdf store","author":"reddivari","year":"2005","journal-title":"Proc of the Policy Management for the Web Workshop"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.4018\/jswis.2009081901"},{"key":"1","article-title":"Containing the semantic explosion","author":"murdock","year":"2012","journal-title":"Proc of the Philo Web Workshop"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583372"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21411-0_21"},{"key":"6","doi-asserted-by":"crossref","first-page":"693","DOI":"10.1007\/978-3-642-03095-6_65","article-title":"A semantic-aware attribute-based access control model for web services","author":"shen","year":"2009","journal-title":"Proc of the 9th International Conference on Algorithms and Architectures for Parallel Processing"},{"key":"5","article-title":"Evolving the Web into a Global Data Space","volume":"2011","author":"heath","year":"0","journal-title":"Morgan & Claypool"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372099"},{"key":"9","article-title":"Linked data access goes mobile: Context-aware authorization for graph stores","author":"costabello","year":"2012","journal-title":"LDOW 5th Workshop on Linked Data on the Web"},{"key":"8","article-title":"A privacy preference ontology (ppo) for linked data","author":"sacco","year":"2011","journal-title":"Proc Linked Data on the Web Workshop"}],"event":{"name":"2013 9th International Conference on Information Assurance and Security (IAS)","start":{"date-parts":[[2013,12,4]]},"location":"Gammarth, Tunisia","end":{"date-parts":[[2013,12,6]]}},"container-title":["2013 9th International Conference on Information Assurance and Security (IAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6915058\/6947727\/06947746.pdf?arnumber=6947746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T20:02:59Z","timestamp":1498161779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6947746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isias.2013.6947746","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}