{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:45:57Z","timestamp":1725536757354},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037924"},{"type":"electronic","value":"9783642037931"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03793-1_4","type":"book-chapter","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T12:16:03Z","timestamp":1250684163000},"page":"52-67","source":"Crossref","is-referenced-by-count":6,"title":["XML Security Views Revisited"],"prefix":"10.1007","author":[{"given":"Beno\u00eet","family":"Groz","sequence":"first","affiliation":[]},{"given":"S\u0142awomir","family":"Staworko","sequence":"additional","affiliation":[]},{"given":"Anne-Cecile","family":"Caron","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Roos","sequence":"additional","affiliation":[]},{"given":"Sophie","family":"Tison","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/11601524_9","volume-title":"Database Programming Languages","author":"M. Benedikt","year":"2005","unstructured":"Benedikt, M., Fundulaki, I.: XML subtree queries: Specification and composition. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol.\u00a03774, pp. 138\u2013153. Springer, Heidelberg (2005)"},{"key":"4_CR2","first-page":"178","volume":"44","author":"B. Courcelle","year":"1991","unstructured":"Courcelle, B.: On constructing obstruction sets of words. Bulletin of the EATCS\u00a044, 178\u2013186 (1991)","journal-title":"Bulletin of the EATCS"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Fan, W., Chan, C.-Y., Garofalakis, M.N.: Secure XML querying with security views. In: ACM SIGMOD International Conference on Management of Data, pp. 587\u2013598 (2004)","DOI":"10.1145\/1007568.1007634"},{"key":"4_CR4","first-page":"1227","volume-title":"International Conference on Very Large Data Bases (VLDB)","author":"W. Fan","year":"2006","unstructured":"Fan, W., Geerts, F., Jia, X., Kementsietsidis, A.: SMOQE: A system for providing secure access to XML. In: International Conference on Very Large Data Bases (VLDB), pp. 1227\u20131230. ACM, New York (2006)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Fan, W., Geerts, F., Jia, X., Kementsietsidis, A.: Rewriting regular XPath queries on XML views. In: International Conference on Data Engineering (ICDE), pp. 666\u2013675 (2007)","DOI":"10.1109\/ICDE.2007.367912"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Fan, W., Yu, J.X., Li, J., Ding, B., Qin, L.: Query translation from XPath to SQL in the presence of recursive DTDs. VLDB Journal (to appear, 2009)","DOI":"10.1007\/s00778-008-0131-0"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0012-365X(77)90103-0","volume":"19","author":"J. Goldstine","year":"1977","unstructured":"Goldstine, J.: A simplified proof of Parikh\u2019s theorem. Discrete Mathematics\u00a019(3), 235\u2013239 (1977)","journal-title":"Discrete Mathematics"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01691341","volume":"2","author":"S.A. Greibach","year":"1968","unstructured":"Greibach, S.A.: A note on undecidable properties of formal languages. Mathematical Systems Theory\u00a02(1), 1\u20136 (1968)","journal-title":"Mathematical Systems Theory"},{"key":"4_CR9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/1063979.1063994","volume-title":"ACM Symposium on Access Control Models and Technologies (SACMAT)","author":"G. Kuper","year":"2005","unstructured":"Kuper, G., Massacci, F., Rassadko, N.: Generalized XML security views. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 77\u201384. ACM, New York (2005)"},{"key":"4_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-89439-1_7","volume-title":"Logic for Programming, Artificial Intelligence, and Reasoning","author":"L. Libkin","year":"2008","unstructured":"Libkin, L., Sirangelo, C.: Reasoning about XML with temporal logics and automata. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS, vol.\u00a05330, pp. 97\u2013112. Springer, Heidelberg (2008)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1007\/978-3-540-28629-5_70","volume-title":"Mathematical Foundations of Computer Science 2004","author":"W. Martens","year":"2004","unstructured":"Martens, W., Neven, F., Schwentick, T.: Complexity of decision problems for simple regular expressions. In: Fiala, J., Koubek, V., Kratochv\u00edl, J. (eds.) MFCS 2004. LNCS, vol.\u00a03153, pp. 889\u2013900. Springer, Heidelberg (2004)"},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1145\/1166074.1166076","volume":"31","author":"W. Martens","year":"2006","unstructured":"Martens, W., Neven, F., Schwentick, T., Bex, G.J.: Expressiveness and complexity of XML schema. ACM Transactions on Database Systems (TODS)\u00a031(3), 770\u2013813 (2006)","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/978-3-540-24741-8_28","volume-title":"Advances in Database Technology - EDBT 2004","author":"M. Marx","year":"2004","unstructured":"Marx, M.: XPath with conditional axis relations. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 477\u2013494. Springer, Heidelberg (2004)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","first-page":"312","volume-title":"Database Theory - ICDT 2003","author":"F. Neven","year":"2002","unstructured":"Neven, F., Schwentick, T.: XPath containment in the presence of disjunction, DTDs, and variables. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol.\u00a02572, pp. 312\u2013326. Springer, Heidelberg (2002)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Papakonstantinou, Y., Vianu, V.: DTD inference for views of XML data. In: ACM Symposium on Principles of Database Systems (PODS), pp. 35\u201346 (2000)","DOI":"10.1145\/335168.335173"},{"issue":"4","key":"4_CR16","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1145\/321356.321364","volume":"13","author":"R.J. Parikh","year":"1966","unstructured":"Parikh, R.J.: On context-free languages. Journal of the ACM\u00a013(4), 570\u2013581 (1966)","journal-title":"Journal of the ACM"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11805588_8","volume-title":"Data and Applications Security XX","author":"N. Rassadko","year":"2006","unstructured":"Rassadko, N.: Policy classes and query rewriting algorithm for XML security views. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 104\u2013118. Springer, Heidelberg (2006)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-540-75248-6_5","volume-title":"Secure Data Management","author":"N. Rassadko","year":"2007","unstructured":"Rassadko, N.: Query rewriting algorithm evaluation for XML security views. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2007. LNCS, vol.\u00a04721, pp. 64\u201380. Springer, Heidelberg (2007)"},{"key":"4_CR19","first-page":"133","volume-title":"IFIP WG 11.3 International Conference on Data and Applications Security","author":"A. Stoica","year":"2002","unstructured":"Stoica, A., Farkas, C.: Secure XML views. In: IFIP WG 11.3 International Conference on Data and Applications Security, pp. 133\u2013146. Kluwer, Dordrecht (2002)"},{"key":"4_CR20","first-page":"122","volume-title":"14th Annual Symposium on Foundations of Computer Science","author":"T.G. Szymanski","year":"1973","unstructured":"Szymanski, T.G., Williams, J.H.: Non-canonical parsing. In: 14th Annual Symposium on Foundations of Computer Science, pp. 122\u2013129. IEEE, Los Alamitos (1973)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"ten Cate, B., Segoufin, L.: XPath, transitive closure logic, and nested tree walking automata. In: ACM Symposium on Principles of Database Systems (PODS), pp. 251\u2013260 (2008)","DOI":"10.1145\/1376916.1376952"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/11896548_22","volume-title":"Current Trends in Database Technology \u2013 EDBT 2006","author":"R. Vercammen","year":"2006","unstructured":"Vercammen, R., Hidders, J., Paredaens, J.: Query translation for XPath-based security views. In: Grust, T., H\u00f6pfner, H., Illarramendi, A., Jablonski, S., Mesiti, M., M\u00fcller, S., Patranjan, P.-L., Sattler, K.-U., Spiliopoulou, M., Wijsen, J. (eds.) EDBT 2006. LNCS, vol.\u00a04254, pp. 250\u2013263. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Database Programming Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03793-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T12:54:40Z","timestamp":1552136080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03793-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037924","9783642037931"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03793-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}