{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:15:49Z","timestamp":1761401749994,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2015,8,1]],"date-time":"2015-08-01T00:00:00Z","timestamp":1438387200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["OIA-1028098"],"award-info":[{"award-number":["OIA-1028098"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"KU General Research Fund","award":["GRF-2301677"],"award-info":[{"award-number":["GRF-2301677"]}]},{"name":"National 973 Program of China","award":["2014CB340603"],"award-info":[{"award-number":["2014CB340603"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2015,8,1]]},"DOI":"10.1109\/tkde.2015.2407366","type":"journal-article","created":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T14:59:11Z","timestamp":1424962751000},"page":"2190-2202","source":"Crossref","is-referenced-by-count":5,"title":["HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches"],"prefix":"10.1109","volume":"27","author":[{"given":"Manogna","family":"Thimma","sequence":"first","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031273"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00887-0_55"},{"key":"ref32","first-page":"469","article-title":"Query caching and view selection for xml databases","author":"mandhani","year":"0","journal-title":"Proc Intl Conf on Very Large Databases"},{"key":"ref31","first-page":"153","article-title":"Security for content distribution networks&#x2013;concepts, systems and research issues","author":"bertino","year":"2007","journal-title":"Security in Distributed Grid and Pervasive Computing"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497556"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063994"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007634"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1178618.1178621"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948122"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2008.919213"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.63"},{"key":"ref29","article-title":"Secure dissemination of xml content using structure-based routing","author":"kundu","year":"0","journal-title":"Proc 10th IEEE Int Conf Enterprise Distrib Object Comput Conf"},{"article-title":"XML 1.1 (2nd Edition)","year":"2006","author":"bray","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_10"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35697-6_11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50009-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646015"},{"key":"ref24","article-title":"Update xml views","author":"liu","year":"0","journal-title":"arXiv preprint arXiv 1302 1923"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2508020.2508021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951388"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1938551.1938560"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(81)90175-2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2462410.2462424"},{"key":"ref58","first-page":"41","article-title":"High-performance XML filtering: An overview of YFilter","volume":"26","author":"diao","year":"2003","journal-title":"IEEE Data Eng Bulletin"},{"year":"0","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539700382820"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2006.06.003"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(92)90077-M"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/BF01580430"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/BF01585178"},{"article-title":"Xml access control language: Provisional authorization for xml documents","year":"2000","author":"hada","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.53"},{"key":"ref40","first-page":"17","article-title":"Access-condition-table-driven access control for xml databases","author":"qi","year":"0","journal-title":"Proc Euro Symp Res Computer Security"},{"article-title":"Extensible access control markup language (xacml) version 1.0","year":"2003","author":"godik","key":"ref12"},{"article-title":"Developing a dynamic trust based access control model for xml databases","year":"2011","author":"farooqi","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2004.1314738"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22185-9_4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968568"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50049-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50050-0"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.111"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019289831564"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935172"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"ref7","first-page":"87","article-title":"Xml document security based on provisional authorization","author":"kudo","year":"0","journal-title":"Proc ACM 7th Conf Comput Commun Security"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009813105532"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099577"},{"article-title":"The XML benchmark project","year":"2001","author":"schmidt","key":"ref46"},{"year":"2003","author":"berglund","key":"ref45"},{"key":"ref48","first-page":"252","article-title":"In-broker access control: Towards efficient end-to-end performance of information brokerage systems","author":"li","year":"0","journal-title":"IEEE Sensor Networks Ubiquitous and Trustworthy Computing"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315308"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099612"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0202-x"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8\/50011-5"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7150523\/07050315.pdf?arnumber=7050315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:51:05Z","timestamp":1641988265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7050315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,1]]},"references-count":59,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2015.2407366","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2015,8,1]]}}}