{"_id":"ZQdMAe9pCP7GuQRCT","bibbaseid":"biskup-bonatti-controlledqueryevaluationforenforcingconfidentialityincompleteinformationsystems-2004","author_short":["Biskup, J.","Bonatti, P."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Joachim"],"propositions":[],"lastnames":["Biskup"],"suffixes":[]},{"firstnames":["Piero"],"propositions":[],"lastnames":["Bonatti"],"suffixes":[]}],"title":"Controlled query evaluation for enforcing confidentiality in complete information systems","journal":"International Journal of Information Security","volume":"3","number":"1","pages":"14–27","month":"October","year":"2004","coden":"????","doi":"https://doi.org/10.1007/s10207-004-0032-1","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Jan 23 16:01:23 MST 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-004-0032-1","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Biskup:2004:CQE,\n author = \"Joachim Biskup and Piero Bonatti\",\n title = \"Controlled query evaluation for enforcing\n confidentiality in complete information systems\",\n journal = j-INT-J-INFO-SEC,\n volume = \"3\",\n number = \"1\",\n pages = \"14--27\",\n month = oct,\n year = \"2004\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-004-0032-1\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Tue Jan 23 16:01:23 MST 2018\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"http://link.springer.com/article/10.1007/s10207-004-0032-1\",\n acknowledgement = ack-nhfb,\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Biskup, J.","Bonatti, P."],"key":"Biskup:2004:CQE","id":"Biskup:2004:CQE","bibbaseid":"biskup-bonatti-controlledqueryevaluationforenforcingconfidentialityincompleteinformationsystems-2004","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-004-0032-1"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","dataSources":["fEXH7XH8oyBtpzKFi"],"keywords":[],"search_terms":["controlled","query","evaluation","enforcing","confidentiality","complete","information","systems","biskup","bonatti"],"title":"Controlled query evaluation for enforcing confidentiality in complete information systems","year":2004}