{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:59:40Z","timestamp":1729659580012,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wise.2003.1254474","type":"proceedings-article","created":{"date-parts":[[2004,5,25]],"date-time":"2004-05-25T16:11:16Z","timestamp":1085501476000},"page":"103-112","source":"Crossref","is-referenced-by-count":3,"title":["Translating content-based authorizations for XML documents"],"prefix":"10.1109","author":[{"given":"S.","family":"Chatvichienchai","sequence":"first","affiliation":[]},{"given":"M.","family":"Iwaihara","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Kambayashi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"87","article-title":"XML Document Security based on Provisional Authorization","author":"kudo","year":"2000","journal-title":"Proc of the 7th ACM conference on Computer and communications security"},{"key":"ref11","first-page":"49","article-title":"Generic Schema Matching with Cupid","author":"madhavan","year":"2001","journal-title":"Proc Of the 27th VLDB Conference"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/502932.502946"},{"journal-title":"W3C XSL Working Group XSL Transformations (XSLT) Version 1 0","year":"1999","key":"ref13"},{"journal-title":"W3C (1999) XML Path Language (XPath) Version 1 0","year":"1999","key":"ref14"},{"journal-title":"W3C (2000) Extensible Markup Language (XML) 1 0","year":"2000","key":"ref15"},{"journal-title":"W3C (2001) XML Schema","year":"2001","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WISE.2002.1181665"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46146-9_29"},{"key":"ref6","first-page":"610","article-title":"COMA - A System for Flexible Combination of Schema Matching Approach","author":"do","year":"2002","journal-title":"Proc of VLDB 2002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253364"},{"key":"ref7","article-title":"RBAC for XML Document Stores","author":"hitchens","year":"2001","journal-title":"Information and Communications Security Third International Conference ICICS 2001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373264"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1023\/A:1019289831564","article-title":"Specifying and Enforcing Access Control Policies for XML Document Sources","volume":"3","author":"bertino","year":"2000","journal-title":"World Wide Web"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539791218202"}],"event":{"name":"Fourth International Conference on Web Information Systems Engineering","acronym":"WISE-03","location":"Rome, Italy"},"container-title":["Proceedings of the 7th International Conference on Properties and Applications of Dielectric Materials (Cat. No.03CH37417)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8885\/28063\/01254474.pdf?arnumber=1254474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:32:13Z","timestamp":1497583933000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1254474\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wise.2003.1254474","relation":{},"subject":[]}}