{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:25:47Z","timestamp":1729628747699,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE Comput. Sci","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wise.2002.1181665","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T15:35:00Z","timestamp":1056641700000},"page":"291-300","source":"Crossref","is-referenced-by-count":3,"title":["Towards translating authorizations for transformed XML documents"],"prefix":"10.1109","author":[{"given":"S.","family":"Chatvichienchai","sequence":"first","affiliation":[]},{"given":"M.","family":"Iwaihara","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"RBAC for XML Document Stores","author":"hitchens","year":"2001","journal-title":"Information and Communications Security Third International Conference ICICS 2001"},{"article-title":"SAXON DTDGenerator","year":"1999","author":"kay","key":"ref11"},{"key":"ref12","article-title":"XML Document Security based on Provisional Authorization","author":"kudo","year":"2000","journal-title":"Proceedings of the 7th ACM conference on computer and communications security"},{"key":"ref13","first-page":"122","article-title":"Using schema matching to simplify heterogeneous data translation","author":"milo","year":"1998","journal-title":"VLDB"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/502932.502946"},{"key":"ref4","article-title":"Extensible Markup Language (XML) 1.0 (Second Edition)","author":"bray","year":"2000","journal-title":"World Wide Web Consortium (W3C)"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019289831564","article-title":"Specifying and Enforcing Access Control Policies for XML Document Sources","volume":"3","author":"bertino","year":"2000","journal-title":"World Wide Web"},{"key":"ref6","article-title":"XML Path Language (XPath) Version 1.0","author":"clark","year":"1999","journal-title":"World Wide Web Consortium (W3C)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46146-9_29"},{"key":"ref8","article-title":"Securing XML documents","author":"damiani","year":"2000","journal-title":"Proceedings of the 2000 International Conference on Extending Database Technology (EDBT&#x2018;2000)"},{"key":"ref7","article-title":"XSL Transformations (XSLT) Version 1.0","author":"clark","year":"1999","journal-title":"World Wide Web Consortium (W3C)"},{"key":"ref2","article-title":"XML-Signature Syntax and Processing","author":"bartel","year":"2002","journal-title":"W3C Candidate Recommendation"},{"year":"2001","key":"ref1"},{"key":"ref9","article-title":"Access to XML documents","author":"gabillon","year":"2001","journal-title":"15th Annual IFIP WG11 3 conference on Database and Applications Security"}],"event":{"name":"WISE 2002. of the Third International Conference on Web Information Systems Engineering","acronym":"WISE-02","location":"Singapore"},"container-title":["Proceedings of the Third International Conference on Web Information Systems Engineering, 2002. WISE 2002."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8419\/26526\/01181665.pdf?arnumber=1181665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:46:30Z","timestamp":1497566790000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1181665\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wise.2002.1181665","relation":{},"subject":[]}}