{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T07:30:56Z","timestamp":1676878256957},"reference-count":24,"publisher":"Informa UK Limited","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2009,12,9]]},"DOI":"10.1080\/19393550903249612","type":"journal-article","created":{"date-parts":[[2009,12,9]],"date-time":"2009-12-09T11:47:27Z","timestamp":1260359247000},"page":"282-296","source":"Crossref","is-referenced-by-count":4,"title":["Parameterized Role-Based Access Control Policies for XML Documents"],"prefix":"10.1080","volume":"18","author":[{"given":"Tomasz","family":"M\u00fcldner","sequence":"first","affiliation":[]},{"given":"Gregory","family":"Leighton","sequence":"additional","affiliation":[]},{"given":"Jan Krzysztof","family":"Mizio\u0142ek","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.63"},{"key":"CIT0003","unstructured":"Bertino, E., Carminati, B. and Ferrari, E. A temporal key management scheme for secure broadcasting of XML documents. Conference on Computer and Comm. Security. Proceedings of the Ninth ACM Conference on Computer and Communications Security. pp.31\u201340."},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935172"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Crampton, J. Applying hierarchical and role-based access control to XML documents. Proceedings of the 2004 Workshop on Secure Web Services. pp.37\u201346.","DOI":"10.1145\/1111348.1111353"},{"key":"CIT0008","unstructured":"Damiani, E., De Capitani di Vimercati, S.D.C. and Samarati, P. New paradigms for access control in open environments. Signal processing and information technology. Proceedings of the Fifth IEEE International Symposium. pp.540\u2013545."},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"CIT0011","unstructured":"Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G. and Stubblebine, S.G. Flexible authentication of XML documents. Proceedings of the Eighth ACM Conference on Computer and Communications Security. New York: ACM Press."},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"CIT0013","unstructured":"Fundulaki, I. and Marx, M. Specifying access control policies for XML documents. Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies. pp.61\u201369."},{"key":"CIT0014","volume-title":"Computers and intractability: A guide to the theory of NP-completeness","author":"Garey M.R.","year":"1979"},{"key":"CIT0015","first-page":"251","author":"Ge M.","year":"2004","journal-title":"DBSec"},{"key":"CIT0016","unstructured":"Giuri, L. and Iglio, P. Role templates for content-based access control. Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC\u201997). November, pp.153\u2013159."},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Goel, S.K., Clinton, C. and Rosenthal, A. Derived access control specification for XML. Proceedings of the 2003 ACM Workshop on XML Security. pp.1\u201314.","DOI":"10.1145\/968559.968561"},{"key":"CIT0018","volume-title":"Knowledge discovery from XML documents","volume":"3915","author":"Kim M.-J.","year":"2006"},{"key":"CIT0019","unstructured":"Kudo, M. and Hada, S. XML document security based on provisional authorization. Proceedings of the Seventh ACM Conference on Computer and Communications Security. pp.87\u201396."},{"key":"CIT0020","unstructured":"Kuper, G., Massaci, F. and Rassadko, N. Generalized XML security views. Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies. pp.77\u201384."},{"key":"CIT0021","first-page":"114","volume-title":"Proceedings of the 2002 IEEE Symposium on Security and Privacy","author":"Li N.","year":"2002"},{"key":"CIT0022","unstructured":"Miklau, G. and Suciu, D. Controlling access to published data using cryptography. Proceedings of the 29th VLDB Conference. Berlin, Germany."},{"key":"CIT0023","unstructured":"M\u00fcldner, T., Mizio\u0142ek, J.K. and Leighton, G. Succinct access control policies for published XML. Tenth International Conference on Enterprise Information Systems. June12\u201316, Barcelona, Spain."},{"key":"CIT0024","volume-title":"Extreme markup languages 2006","author":"M\u00fcldner T.","year":"2006"},{"key":"CIT0025","volume-title":"Secure using schema-level role-based access control policies for fragments of XML documents","author":"M\u00fcldner T.","year":"2008"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990047"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393550903249612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T11:09:37Z","timestamp":1558696177000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/19393550903249612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,9]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,12,9]]}},"alternative-id":["10.1080\/19393550903249612"],"URL":"https:\/\/doi.org\/10.1080\/19393550903249612","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,12,9]]}}}