{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:42:46Z","timestamp":1750308166209,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1063995","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"85-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Relevancy based access control of versioned XML documents"],"prefix":"10.1145","author":[{"given":"Mizuho","family":"Iwaihara","sequence":"first","affiliation":[{"name":"Kyoto University, Kyoto, Japan"}]},{"given":"Somchai","family":"Chatvichienchai","sequence":"additional","affiliation":[{"name":"Siebold University of Nagasaki, Nagasaki, Japan"}]},{"given":"Chutiporn","family":"Anutariya","sequence":"additional","affiliation":[{"name":"Shinawatra University, Pathumthani, Thailand"}]},{"given":"Vilas","family":"Wuwongse","sequence":"additional","affiliation":[{"name":"Asian Institute of Technology, Pathumthani, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39715-1_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485637"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019289831564"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30075-5_76"},{"key":"e_1_3_2_1_5_1","first-page":"291","volume-title":"27th VLDB Conf.","author":"Chien S. Y.","year":"2001","unstructured":"S. Y. Chien , V. J. Tsotras , and C. Zaniolo , \" Efficient Management of Multiversion Documents by Object Referencing,\" Proc . 27th VLDB Conf. , pp. 291 -- 300 , Sep. 2001 . S. Y. Chien, V. J. Tsotras, and C. Zaniolo, \"Efficient Management of Multiversion Documents by Object Referencing,\" Proc. 27th VLDB Conf., pp. 291--300, Sep. 2001."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"e_1_3_2_1_7_1","first-page":"84","volume-title":"Proc. of the 30th VLDB conference","author":"Bouganim L.","year":"2004","unstructured":"L. Bouganim , F. Dang Ngoc , P. Pucheral , \" Client-Based Access Control Management for XML Documents ,\" Proc. of the 30th VLDB conference , pp. 84 -- 95 , Sep. 2004 . L. Bouganim, F. Dang Ngoc, P. Pucheral, \"Client-Based Access Control Management for XML Documents,\" Proc. of the 30th VLDB conference, pp. 84--95, Sep. 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968567"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352613"},{"key":"e_1_3_2_1_10_1","first-page":"581","volume-title":"27th VLDB Conf.","author":"Marian A.","year":"2001","unstructured":"A. Marian , S. Abiteboul , G. Cobna , and L. Mignet , \" Change-centric management of versions in an XML warehouse,\" Proc . 27th VLDB Conf. , pp. 581 -- 590 , Sep. 2001 . A. Marian, S. Abiteboul, G. Cobna, and L. Mignet, \"Change-centric management of versions in an XML warehouse,\" Proc. 27th VLDB Conf., pp. 581--590, Sep. 2001."},{"key":"e_1_3_2_1_11_1","unstructured":"OASIS XACML Technical Committee \"eXtensible Access Control Markup Language (XACML) Version 2.0 \" http:\/\/www.oasis-open.org\/specs\/index.php #xacmlv2.0 Feb. 2005.  OASIS XACML Technical Committee \"eXtensible Access Control Markup Language (XACML) Version 2.0 \" http:\/\/www.oasis-open.org\/specs\/index.php #xacmlv2.0 Feb. 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"W3C Recommendation","author":"Path XML","year":"1999","unstructured":"XML Path Language (XPath) Version 1.0 , W3C Recommendation 16 November 1999 , http:\/\/www.w3.org\/TR\/xpath. XML Path Language (XPath) Version 1.0, W3C Recommendation 16 November 1999, http:\/\/www.w3.org\/TR\/xpath."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/585058.585073"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/5254.940027"}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Stockholm Sweden","acronym":"SACMAT05"},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1063995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1063995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":14,"alternative-id":["10.1145\/1063979.1063995","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1063995","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}