{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:53:19Z","timestamp":1725551599510},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307068"},{"type":"electronic","value":"9783540324225"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11593980_12","type":"book-chapter","created":{"date-parts":[[2005,11,3]],"date-time":"2005-11-03T07:40:20Z","timestamp":1131003620000},"page":"164-176","source":"Crossref","is-referenced-by-count":4,"title":["EISA \u2013 An Enterprise Application Security Solution for Databases"],"prefix":"10.1007","author":[{"given":"V.","family":"Radha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"N. Hemanth","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"unstructured":"Computer Science Institute, CSI\/FBI Computer Crime and Security Survey, www.gocsi.com\/forms\/fbi\/pdf.html","key":"12_CR1"},{"unstructured":"The eCriteria DSP, www.ecriteria.net","key":"12_CR2"},{"doi-asserted-by":"crossref","unstructured":"He, J., Wang, M.: Cryptography and Relational Database Management Systems. In: Int. Database and Engineering and Application Symposium (2001)","key":"12_CR3","DOI":"10.1109\/IDEAS.2001.938095"},{"unstructured":"Mattsson, U.: Secure Data Functional Overview, Protegity Technical Paper TWP-0011 (2000), http:\/\/www.protegity.com\/White_Papers.html","key":"12_CR4"},{"unstructured":"TPC-H Benchmark Specification, http:\/\/www.tpc.org","key":"12_CR5"},{"doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Providing database as a service. In: Proc. Of the 18th International Conference on Data engineering (2002)","key":"12_CR6","DOI":"10.1109\/ICDE.2002.994695"},{"doi-asserted-by":"crossref","unstructured":"Bouganium, L., Pucheral, P.: Chip-secured data access: Confidential data on untrusted servers. In: Proc. Of the 28th International Conference on Very Large Data Bases (2002)","key":"12_CR7","DOI":"10.1016\/B978-155860869-6\/50020-2"},{"unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proc. Of the IEEE Symposium on Security and Privacy (2000)","key":"12_CR8"},{"doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the ACM SIGMOD (2002)","key":"12_CR9","DOI":"10.1145\/564691.564717"},{"doi-asserted-by":"crossref","unstructured":"Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing Confidentiality and efficiency in untrusted relational dbmss. In: Proc of the 10th ACM Conference on Computer and Communications Society (2003)","key":"12_CR10","DOI":"10.1145\/948109.948124"},{"doi-asserted-by":"crossref","unstructured":"Davida, G., Wells, D., Kam, J.: A database encryption system with subkeys. ACM Transactions on Database Systems (1981)","key":"12_CR11","DOI":"10.1145\/319566.319580"},{"unstructured":"Advanced Encryption Standard, National Institute of Science and Technology, FIPS 197 (2001)","key":"12_CR12"},{"unstructured":"He, J., Wang, M.: Encryption in relational database management systems. In: Proc. Of Fourteenth Annual IFIP WG11.3 Working Conference on Database Security, DBSec (2000)","key":"12_CR13"},{"unstructured":"Damiani, E., di Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Implementation of a Storage Mechanism for Untrusted DBMSs. In: Proc. of the 2nd IEEE International Security in Storage Workshop (2004)","key":"12_CR14"},{"key":"12_CR15","volume-title":"Encrypted Database Design: Specialized Approaches","author":"N.R. Wagner","year":"1986","unstructured":"Wagner, N.R., Putter, P.S.: Encrypted Database Design: Specialized Approaches. IEEE, Los Alamitos (1986)"},{"unstructured":"Ozsoyogulu, G., Singer, D.A., Chang, S.S.: Anti-Tamper databases: Querying Encrypted Databases","key":"12_CR16"},{"doi-asserted-by":"crossref","unstructured":"Agarwal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: ACM SIGMOD Conference on Management of Data. ACM Press, New York (2004)","key":"12_CR17","DOI":"10.1145\/1007568.1007632"},{"unstructured":"Kantarciouglo, M., Clifton, C.: Security Issues in Querying Encrypted Data. Purdue Computer Science Technical Report 04-013","key":"12_CR18"},{"unstructured":"Nanda, A., Burleson, D.K.: Text Book on \u201cOracle Privacy Security Auditing\u201d","key":"12_CR19"},{"unstructured":"Gramm-Leach Bliley Act, http:\/\/www.ftc.gob\/privacy\/glbact\/glbsub1.html","key":"12_CR20"},{"unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Providing Authentication and Integrity in Outsourced Databases using Merkley Hash Trees. UCI-SCONCE Technical Report (2003), http:\/\/sconce.ics.uci.edu\/das\/MerkleODB.pdf","key":"12_CR21"},{"unstructured":"Iyer, H.B., Mehrotra, S.: Encrypted Database Integrity in Database Service Provider Model. In: International Workshop on Certification and Security in E-Services (CSES 2002 IFIP WCC) (2002)","key":"12_CR22"},{"unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and Integrity in Outsourced Databases","key":"12_CR23"},{"doi-asserted-by":"crossref","unstructured":"Graubart, R.: The Integrity-Lock Approach to Secure Database Management. In: The Mitre Corporation, Bedford, MA. IEEE, Los Alamitos (1984)","key":"12_CR24","DOI":"10.1109\/SP.1984.10017"},{"doi-asserted-by":"crossref","unstructured":"Zhang, C.N., Zhong, H.: An Integrated Approach for Database Security and Fault Tolerance. In: Proceedings of the International Conference on Information technology: Coding and Computing (ITCC 2004). IEEE, Los Alamitos (2004)","key":"12_CR25","DOI":"10.1109\/ITCC.2004.1286560"},{"unstructured":"White Papers form Application Security Inc., http:\/\/www.appsecinc.com\/whitepapers","key":"12_CR26"},{"unstructured":"White Papers from nCipher, http:\/\/active.ncipher.com\/index.php","key":"12_CR27"},{"unstructured":"SHA, http:\/\/www.itl.nist.gov\/fipspubs\/fip180-1.htm","key":"12_CR28"},{"unstructured":"Crypto Package, http:\/\/www.acme.com\/java\/software\/Package-Acme.Crypto.html","key":"12_CR29"},{"unstructured":"Tomcat Server, http:\/\/www.apache.org\/","key":"12_CR30"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11593980_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:02:53Z","timestamp":1605643373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11593980_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307068","9783540324225"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/11593980_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}