{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:42:11Z","timestamp":1767066131557,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSERC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3029806.3029827","type":"proceedings-article","created":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T12:34:59Z","timestamp":1490013299000},"page":"337-348","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF)"],"prefix":"10.1145","author":[{"given":"Zhiyuan","family":"Lin","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Mahesh","family":"Tripunitara","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1785162.1785164"},{"key":"e_1_3_2_1_2_1","first-page":"26","volume-title":"RDF Next Steps Workshop","author":"Arenas M.","year":"2010"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76298-0_52"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2007.147"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900567"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422449"},{"key":"e_1_3_2_1_7_1","unstructured":"L. Civic Impulse. Govtrack. https:\/\/www.govtrack.us\/. Accessed: 2016-07-01.  L. Civic Impulse. Govtrack. https:\/\/www.govtrack.us\/. Accessed: 2016-07-01."},{"key":"e_1_3_2_1_8_1","unstructured":"T. H. Cormen C. Stein R. L. Rivest and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education 2nd edition 2001.   T. H. Cormen C. Stein R. L. Rivest and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education 2nd edition 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929268.1929280"},{"volume-title":"Cambridge University Press","year":"2008","author":"Goldreich O.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_1_12_1","unstructured":"P. Hayes and B. McBride. Rdf semantics 2014.  P. Hayes and B. McBride. Rdf semantics 2014."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security","volume":"13","author":"Imeson F.","year":"2013"},{"key":"e_1_3_2_1_14_1","unstructured":"C. Inc. Stardog: Enterprise data unification with smart graphs. http:\/\/stardog.com\/. Accessed: 2016-07-01.  C. Inc. Stardog: Enterprise data unification with smart graphs. http:\/\/stardog.com\/. Accessed: 2016-07-01."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133076"},{"key":"e_1_3_2_1_16_1","unstructured":"A. Jena. Apache jena. jena. apache. org {Online}. Available: http:\/\/jena. apache. org {Accessed: Mar. 20 2014} 2013.  A. Jena. Apache jena. jena. apache. org {Online}. Available: http:\/\/jena. apache. org {Accessed: Mar. 20 2014} 2013."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/0210002"},{"key":"e_1_3_2_1_19_1","unstructured":"F. Manola E. Miller and B. McBride. Rdf 1.1 Primer 2014. Available from https:\/\/www.w3.org\/TR\/2014\/NOTE-rdf11-primer-20140225\/  F. Manola E. Miller and B. McBride. Rdf 1.1 Primer 2014. Available from https:\/\/www.w3.org\/TR\/2014\/NOTE-rdf11-primer-20140225\/"},{"volume-title":"International Conference on Logic Programming (ICLP), Technical Communications. International Conference on Logic Programming (ICLP)","year":"2012","author":"Mileo A.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"e_1_3_2_1_22_1","unstructured":"E. Prud Hommeaux A. Seaborne etal Sparql query language for rdf. W3C recommendation 15 2008.  E. Prud Hommeaux A. Seaborne et al. Sparql query language for rdf. W3C recommendation 15 2008."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613092"},{"key":"e_1_3_2_1_24_1","first-page":"78","volume-title":"Proceedings of the Policy Management for the Web workshop","volume":"120","author":"Reddivari P.","year":"2005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20810-7_24"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2005.06.001"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533088"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739058"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, security, and trust in KDD","author":"Zheleva E.","year":"2008"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"}],"event":{"name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CODASPY '17"},"container-title":["Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029827","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3029806.3029827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:29Z","timestamp":1750218629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3029806.3029827"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":32,"alternative-id":["10.1145\/3029806.3029827","10.1145\/3029806"],"URL":"https:\/\/doi.org\/10.1145\/3029806.3029827","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}