{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:30Z","timestamp":1762004610367,"version":"build-2065373602"},"reference-count":16,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"funder":[{"DOI":"10.13039\/501100004085","name":"Ministry of Education, Science and Technology","doi-asserted-by":"publisher","award":["NRF-2010-0021059"],"award-info":[{"award-number":["NRF-2010-0021059"]}],"id":[{"id":"10.13039\/501100004085","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1016\/j.csi.2014.08.006","type":"journal-article","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T22:36:05Z","timestamp":1409092565000},"page":"51-63","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Efficient authorization conflict detection using graph labeling in controlling access to RDF"],"prefix":"10.1016","volume":"38","author":[{"given":"Jaehoon","family":"Kim","sequence":"first","affiliation":[]},{"given":"Seog","family":"Park","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.csi.2014.08.006_bb0005","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/69.895801","article-title":"Secure databases: constraints, inference channels, and monitoring disclosures","volume":"12","author":"Brodsky","year":"2000","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.csi.2014.08.006_bb0010","series-title":"Proc. of 11th ACM Symposium on Access Control Models and Technologies","first-page":"121","article-title":"Secure resource description framework: an access control model","author":"Jain","year":"2006"},{"issue":"3","key":"10.1016\/j.csi.2014.08.006_bb0015","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/545186.545190","article-title":"Secure and selective dissemination of XML documents","volume":"5","author":"Bertino","year":"2002","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"2","key":"10.1016\/j.csi.2014.08.006_bb0020","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/505586.505590","article-title":"A fine-grained access control system for XML documents","volume":"5","author":"Damiani","year":"2002","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/j.csi.2014.08.006_bb0025","series-title":"Proc. of the 6th ISWC and 2nd ASWC","first-page":"1","article-title":"Enabling advanced and context-dependent access control in RDF stores","author":"Abel","year":"2007"},{"key":"10.1016\/j.csi.2014.08.006_bb0030","series-title":"Proc. of First International Workshop on Secure Semantic Web in conjunction with ICDE'08","first-page":"462","article-title":"An RDF triple based access authorization specification considering subsumption relationships","author":"Kim","year":"2008"},{"issue":"1","key":"10.1016\/j.csi.2014.08.006_bb0035","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1587\/transinf.E92.D.41","article-title":"RDFacl: a secure access control model based on RDF triple","volume":"E92-D","author":"Kim","year":"2009","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.csi.2014.08.006_bb0040","series-title":"Proc. of ACM Workshop on XML Security","first-page":"94","article-title":"Concept-level access control for the semantic web","author":"Qin","year":"2003"},{"key":"10.1016\/j.csi.2014.08.006_bb0045","series-title":"Proc. of the Policy Management for the Web Workshop","first-page":"78","article-title":"Policy-based access control for an RDF store","author":"Reddivari","year":"2003"},{"author":"RDF Semantics","key":"10.1016\/j.csi.2014.08.006_bb0050"},{"author":"RDF Vocabulary Description Language 1.0: RDF Schema","key":"10.1016\/j.csi.2014.08.006_bb0055"},{"key":"10.1016\/j.csi.2014.08.006_bb0060","series-title":"Proc. of the 2nd International Semantic Web Policy Workshop (SWPW'06)","article-title":"An access control model for protecting semantic web resources","author":"Javanmardi","year":"2006"},{"key":"10.1016\/j.csi.2014.08.006_bb0065","series-title":"Proc. of the Workshop on Secure Web Services","first-page":"43","article-title":"Policy-based dissemination of partial web-ontologies","author":"Kaushik","year":"2005"},{"issue":"1","key":"10.1016\/j.csi.2014.08.006_bb0070","first-page":"207","article-title":"Optimizing taxonomic semantic web queries using labeling schemes","volume":"11","author":"Christophides","year":"2003","journal-title":"J. Web Semant."},{"key":"10.1016\/j.csi.2014.08.006_bb0075","series-title":"Proc. of 17th ACM Symposium on Access Control Models and Technologies","first-page":"103","article-title":"Access control for RDF graphs using abstract models","author":"Papakonstantinou","year":"2012"},{"author":"OWLIM","key":"10.1016\/j.csi.2014.08.006_bb0080"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548914000841?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548914000841?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T16:24:28Z","timestamp":1760286268000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548914000841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":16,"alternative-id":["S0920548914000841"],"URL":"https:\/\/doi.org\/10.1016\/j.csi.2014.08.006","relation":{},"ISSN":["0920-5489"],"issn-type":[{"type":"print","value":"0920-5489"}],"subject":[],"published":{"date-parts":[[2015,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Efficient authorization conflict detection using graph labeling in controlling access to RDF","name":"articletitle","label":"Article Title"},{"value":"Computer Standards & Interfaces","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.csi.2014.08.006","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}