{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:15:30Z","timestamp":1759331730503},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307679"},{"type":"electronic","value":"9783540322498"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596370_5","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T13:20:56Z","timestamp":1132838456000},"page":"28-48","source":"Crossref","is-referenced-by-count":11,"title":["Implementing a Tamper-Evident Database System"],"prefix":"10.1007","author":[{"given":"Gerome","family":"Miklau","sequence":"first","affiliation":[]},{"given":"Dan","family":"Suciu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Anley, C.: Advanced SQL injection in SQL server applications. NGSSoftware Insight Security (2002), available from \n                      \n                        http:\/\/www.ngssoftware.com"},{"key":"5_CR2","first-page":"110","volume-title":"Symposium on Access control models and technologies","author":"E. Bertino","year":"2003","unstructured":"Bertino, E., Mella, G., Correndo, G., Ferrari, E.: An infrastructure for managing secure update operations on xml data. In: Symposium on Access control models and technologies, pp. 110\u2013122. ACM Press, New York (2003)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1145\/501983.502003","volume-title":"Proceedings of the 8th ACM conference on Computer and Communications Security","author":"P. Devanbu","year":"2001","unstructured":"Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, S.G.: Flexible authentication of XML documents. In: Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 136\u2013145. ACM Press, New York (2001)"},{"issue":"3","key":"5_CR4","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet. J. of Computer Security\u00a011(3), 291\u2013314 (2003)","journal-title":"J. of Computer Security"},{"key":"5_CR5","unstructured":"Devanbu, P.T., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: IFIP Work. on Database Security (2000)"},{"key":"5_CR6","unstructured":"Edelsbrunner, H.: Dynamic data structures for orthogonal intersection queries. Technical report, Technical University of Graz, Austria (1980)"},{"key":"5_CR7","unstructured":"Secure hash standard (SHA). Federal Information Processing Standard Publication 180-2 (2000)"},{"key":"5_CR8","unstructured":"Gordon, L.A., Loeb, M.P., Lucyshyn, W., Richardson, R.: 2004 CSI\/FBI computer crime and security survey. Computer Security Institute (2004)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Kocher, P.C.: On certificate revocation and validation. In: Fin. Cryptography, pp. 172\u2013177 (1998)","DOI":"10.1007\/BFb0055481"},{"key":"5_CR10","unstructured":"Kriegel, H.-P., Potke, M., Seidl, T.: Managing intervals efficiently in object-relational databases. In: VLDB Conference, pp. 407\u2013418 (2000)"},{"key":"5_CR11","unstructured":"Merkle, R.C.: Secrecy, authentication, and public key systems. PhD thesis, Information Systems Laboratory, Stanford University (1979)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: Protocols for public key cryptosystems. In: Symp. Security & Privacy (1980)","DOI":"10.1109\/SP.1980.10006"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Micali, S., Rabin, M.O., Kilian, J.: Zero-knowledge sets. In: FOCS (2003)","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"5_CR15","unstructured":"Miklau, G., Suciu, D.: Managing integrity for data exchanged on the web. In: Doan, A., Neven, F., McCann, R., Bex, G.J. (eds.) WebDB, pp. 13\u201318 (2005)"},{"key":"5_CR16","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: USENIX Security Symp. (1998)"},{"key":"5_CR17","unstructured":"Ostrovsky, R., Rackoff, C., Smith, A.: Efficient consistency proofs on a committed database"},{"key":"5_CR18","unstructured":"The 10 most critical web application security vulnerabilities. OWASP (January 2004), \n                      \n                        http:\/\/aspectsecurity.com\/topten\/"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: SIGMOD Conference, pp. 407\u2013418 (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.-L.: Authenticating query results in edge computing. In: ICDE (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"5_CR21","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1098-6","volume-title":"Computational Geometry","author":"F.P. Preparata","year":"1985","unstructured":"Preparata, F.P., Shamos, M.I.: Computational Geometry. Springer, New York (1985)"},{"key":"5_CR22","unstructured":"The 20 most critical internet security vulnerabilities. SANS Inst (October 2004), \n                      \n                        http:\/\/www.sans.org\/top20\/"},{"key":"5_CR23","unstructured":"SQL injection: Are your web applications vulnerable? SPI Dynamics Inc. White Paper, Retrieved Oct 1, 2004 from (2002), \n                      \n                        http:\/\/www.spidynamics.com"}],"container-title":["Lecture Notes in Computer Science","Advances in Computer Science \u2013 ASIAN 2005. Data Management on the Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596370_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:55:17Z","timestamp":1619506517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596370_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307679","9783540322498"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11596370_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}