{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:58:11Z","timestamp":1743155891170,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":7,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387355443"},{"type":"electronic","value":"9780387399409"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-0-387-39940-9_5","type":"book-chapter","created":{"date-parts":[[2009,9,16]],"date-time":"2009-09-16T08:08:14Z","timestamp":1253088494000},"page":"15-18","source":"Crossref","is-referenced-by-count":1,"title":["Access Control Policy Languages"],"prefix":"10.1007","author":[{"given":"Athena","family":"Vakali","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1_5","doi-asserted-by":"crossref","unstructured":"Bertino E., Castano S., and Ferrari E. On specifying security policies for web documents with an XML-based language. In Proc. 6th ACM Symp. on Access Control Models and Technologies, 2001, pp. 57\u201365.","DOI":"10.1145\/373256.373264"},{"key":"5_CR2_5","doi-asserted-by":"crossref","unstructured":"Bertino E., Castano S., and Ferrari E. Securing XML documents with author-X. IEEE Internet Computing, May\u2013June 2001, pp. 21\u201331.","DOI":"10.1109\/4236.935172"},{"key":"5_CR3_5","unstructured":"Damiani E., De Capitani di Vimercati S., Paraboschi S., and Samarati P. 2000, Desing and implementation of an access control processor for XML documents. In Proc. 9th Int. World Wide Web Conference, pp. 59\u201375."},{"key":"5_CR4_5","doi-asserted-by":"crossref","unstructured":"He H. and Wong R.K. A role-based access control model for XML repositories. In Proc. 1st Int. Conf. on Web Information Systems Eng., 2000, pp. 138\u2013145.","DOI":"10.1109\/WISE.2000.882385"},{"key":"5_CR5_5","unstructured":"Stoupa K. Access Control Techniques in distributed systems and the Internet, Ph.D. Thesis, Aristotle University, Department of Informatics, 2007."},{"key":"5_CR6_5","volume-title":"Web and Information Security","author":"K. Stoupa","year":"2006","unstructured":"Stoupa K. and Vakali A. Policies for web security services, Chapter III. In Web and Information Security, E. Ferrari, B. Thuraisingham (eds.), Idea-Group Publishing, USA, 2006."},{"key":"5_CR7_5","doi-asserted-by":"crossref","unstructured":"Vuong N.N., Smith G.S., and Deng Y. Managing security policies in a distributed environment using eXtensible markup language (XML). In Proc. 16th ACM Symp. on Applied Computing, 2001, pp. 405\u2013411.","DOI":"10.1145\/372202.372386"}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-39940-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:25:14Z","timestamp":1739337914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-39940-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9780387355443","9780387399409"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-39940-9_5","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}