{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:03Z","timestamp":1750309083728,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T00:00:00Z","timestamp":1531094400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,9]]},"DOI":"10.1145\/3221269.3232012","type":"proceedings-article","created":{"date-parts":[[2018,7,10]],"date-time":"2018-07-10T16:26:42Z","timestamp":1531240002000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Declarative cartography under fine-grained access control"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Jensen","sequence":"first","affiliation":[{"name":"Danske Bank, Copenhagen, Denmark and University of Copenhagen"}]},{"given":"Marcos Antonio Vaz","family":"Salles","sequence":"additional","affiliation":[{"name":"University of Copenhagen, Copenhagen, Denmark"}]},{"given":"Michael Vindahl","family":"Bang","sequence":"additional","affiliation":[{"name":"Danske Bank, Copenhagen, Denmark and University of Copenhagen"}]}],"member":"320","published-online":{"date-parts":[[2018,7,9]]},"reference":[{"volume-title":"Foundations of Databases","author":"Abiteboul Serge","key":"e_1_3_2_1_1_1","unstructured":"Serge Abiteboul , Richard Hull , and Victor Vianu . 1995. Foundations of Databases . Addison-Wesley . Serge Abiteboul, Richard Hull, and Victor Vianu. 1995. Foundations of Databases. Addison-Wesley."},{"volume-title":"Proc. ICDE. 208--217","author":"Aiken A.","key":"e_1_3_2_1_2_1","unstructured":"A. Aiken , J. Chen , Michael Stonebraker , and A. Woodruff . 1996. Tioga-2: a direct manipulation database visualization environment . In Proc. ICDE. 208--217 . A. Aiken, J. Chen, Michael Stonebraker, and A. Woodruff. 1996. Tioga-2: a direct manipulation database visualization environment. In Proc. ICDE. 208--217."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.32"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691708"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1032222.1032236"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063985"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. &lt;XIME-P\/> Workshop.","author":"Boncz Peter A.","year":"2005","unstructured":"Peter A. Boncz , Stefan Manegold , and Jan Rittinger . 2005 . Updating the Pre\/Post Plane in MonetDB\/XQuery . In Proc. &lt;XIME-P\/> Workshop. Peter A. Boncz, Stefan Manegold, and Jan Rittinger. 2005. Updating the Pre\/Post Plane in MonetDB\/XQuery. In Proc. &lt;XIME-P\/> Workshop."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_27"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939502.2939513"},{"key":"e_1_3_2_1_10_1","volume-title":"Keeping an eye on privacy issues with geospatial data. Nature 441 (05","author":"Curtis Andrew","year":"2006","unstructured":"Andrew Curtis , Jacqueline W. Mills , and Michael Leitner . 2006. Keeping an eye on privacy issues with geospatial data. Nature 441 (05 2006 ), 150 EP - . Andrew Curtis, Jacqueline W. Mills, and Michael Leitner. 2006. Keeping an eye on privacy issues with geospatial data. Nature 441 (05 2006), 150 EP -."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Maria Luisa Damiani and Elisa Bertino. 2007. Access Control Systems for Geospatial Data and Applications. In Belussi A. Catania B. Clementini E. Ferrari E. (eds) Spatial Data on the Web. 189--214.  Maria Luisa Damiani and Elisa Bertino. 2007. Access Control Systems for Geospatial Data and Applications. In Belussi A. Catania B. Clementini E. Ferrari E. (eds) Spatial Data on the Web. 189--214.","DOI":"10.1007\/978-3-540-69878-4_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(93)90057-C"},{"key":"e_1_3_2_1_13_1","volume-title":"d.}. Future Cropping partnership website. ({n. d.}).","author":"Future Cropping","year":"2017","unstructured":"Future Cropping {n. d.}. Future Cropping partnership website. ({n. d.}). Available at https:\/\/futurecropping.dk\/en\/, last accessed September 8, 2017 . Future Cropping {n. d.}. Future Cropping partnership website. ({n. d.}). Available at https:\/\/futurecropping.dk\/en\/, last accessed September 8, 2017."},{"key":"e_1_3_2_1_14_1","first-page":"3","article-title":"Twenty years of progress: GIScience in 2010","volume":"1","author":"Goodchild Michael F.","year":"2010","unstructured":"Michael F. Goodchild . 2010 . Twenty years of progress: GIScience in 2010 . J. Spatial Information Science 1 , 1 (2010), 3 -- 20 . Michael F. Goodchild. 2010. Twenty years of progress: GIScience in 2010. J. Spatial Information Science 1, 1 (2010), 3--20.","journal-title":"J. Spatial Information Science"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191886"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183738"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213902"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway.","author":"Hansen Frode","year":"2003","unstructured":"Frode Hansen and Vladimir Oleshchuk . 2003 . SRBAC: a spatial role-based access control model for mobile systems . In Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway. Frode Hansen and Vladimir Oleshchuk. 2003. SRBAC: a spatial role-based access control model for mobile systems. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, Norway."},{"key":"e_1_3_2_1_19_1","volume-title":"Modelling the overall process of generalisation. Generalisation of geographic information: cartographic modelling and applications","author":"Harrie Lars","year":"2007","unstructured":"Lars Harrie and Robert Weibel . 2007. Modelling the overall process of generalisation. Generalisation of geographic information: cartographic modelling and applications ( 2007 ), 67--88. Lars Harrie and Robert Weibel. 2007. Modelling the overall process of generalisation. Generalisation of geographic information: cartographic modelling and applications (2007), 67--88."},{"key":"e_1_3_2_1_20_1","volume-title":"Global Overview.","author":"Ponemon Institute","year":"2017","unstructured":"Ponemon Institute . 2017. 2017 Cost of Data Breach Study , Global Overview. ( 2017 ). Sponsored by IBM Security ; available at http:\/\/www-03.ibm.com\/security\/data-breach\/, last accessed September 8, 2017. Ponemon Institute. 2017. 2017 Cost of Data Breach Study, Global Overview. (2017). Sponsored by IBM Security; available at http:\/\/www-03.ibm.com\/security\/data-breach\/, last accessed September 8, 2017."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2945.722299"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732953"},{"volume-title":"Proc. ICDE. 1174--1183","author":"Kabra Govind","key":"e_1_3_2_1_23_1","unstructured":"Govind Kabra , Ravishankar Ramamurthy , and S. Sudarshan . 2007. Fine Grained Authorization Through Predicated Grants . In Proc. ICDE. 1174--1183 . Govind Kabra, Ravishankar Ramamurthy, and S. Sudarshan. 2007. Fine Grained Authorization Through Predicated Grants. In Proc. ICDE. 1174--1183."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816720"},{"volume-title":"Proc. ICDE. 288--297","author":"Krishnamurthy R.","key":"e_1_3_2_1_26_1","unstructured":"R. Krishnamurthy and M. Zloof . 1995. RBE: Rendering by example . In Proc. ICDE. 288--297 . R. Krishnamurthy and M. Zloof. 1995. RBE: Rendering by example. In Proc. ICDE. 288--297."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.179"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.12129"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253335"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063983"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1824401.1824403"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498287"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1316689.1316776"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2539032.2539034"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11908883_14"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2320731"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2756547"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564745"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061359"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2613087.2613098"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. VLDB. 555--566","author":"Wang Qihua","year":"2007","unstructured":"Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , and Ji-Won Byun . 2007 . On the Correctness Criteria of Fine-Grained Access Control in Relational Databases . In Proc. VLDB. 555--566 . Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, and Ji-Won Byun. 2007. On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. In Proc. VLDB. 555--566."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/11733836_56"}],"event":{"name":"SSDBM '18: 30th International Conference on Scientific and Statistical Database Management","acronym":"SSDBM '18","location":"Bozen-Bolzano Italy"},"container-title":["Proceedings of the 30th International Conference on Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3221269.3232012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3221269.3232012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:29Z","timestamp":1750286609000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3221269.3232012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,9]]},"references-count":42,"alternative-id":["10.1145\/3221269.3232012","10.1145\/3221269"],"URL":"https:\/\/doi.org\/10.1145\/3221269.3232012","relation":{},"subject":[],"published":{"date-parts":[[2018,7,9]]},"assertion":[{"value":"2018-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}