{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:40:29Z","timestamp":1725496829424},"publisher-location":"Boston, MA","reference-count":37,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387485324"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-48533-1_5","type":"book-chapter","created":{"date-parts":[[2007,12,2]],"date-time":"2007-12-02T08:10:18Z","timestamp":1196583018000},"page":"115-136","source":"Crossref","is-referenced-by-count":6,"title":["Authenticated Index Structures for Outsourced Databases"],"prefix":"10.1007","author":[{"given":"Feifei","family":"Li","sequence":"first","affiliation":[]},{"given":"Marios","family":"Hadjileftheriou","sequence":"additional","affiliation":[]},{"given":"George","family":"Kollios","sequence":"additional","affiliation":[]},{"given":"Leonid","family":"Reyzin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: Proc. of International Conference on Data Engineering (ICDE). (2002) 29\u201340","DOI":"10.1109\/ICDE.2002.994695"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of Very Large Data Bases (VLDB). (2004) 720\u2013731","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proc. of ACM Management of Data (SIGMOD). (2000) 439\u2013450","DOI":"10.1145\/342009.335438"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proc. of ACM Symposium on Principles of Database Systems (PODS). (2003) 211\u2013222","DOI":"10.1145\/773153.773174"},{"key":"5_CR5","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database service provider model. In: Proc. of ACM Management of Data (SIGMOD). (2002) 216\u2013227"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of Very Large Data Bases (VLDB). (2003) 898\u2013909","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proc. of ACM Management of Data (SIGMOD). (2004) 551\u2013562","DOI":"10.1145\/1007568.1007631"},{"key":"5_CR8","unstructured":"Bouganim, L., Ngoc, F.D., Pucheral, P., Wu, L.: Chip-secured data access: Reconciling access rights with data encryption. In: Proc. of Very Large Data Bases (VLDB). (2003) 1133\u20131136"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.L.: Verifying completeness of relational query results in data publishing. In: Proc. of ACM Management of Data (SIGMOD). (2005) 407\u2013418","DOI":"10.1145\/1066157.1066204"},{"key":"5_CR10","unstructured":"Sion, R.: Query execution assurance for outsourced databases. In: Proc. of Very Large Data Bases (VLDB). (2005) 601\u2013612"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Anagnostopoulos, A., Goodrich, M., Tamassia, R.: Persistent authenticated dictionaries and their applications. In: ISC. (2001) 379\u2013393","DOI":"10.1007\/3-540-45439-X_26"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. In: CT-RSA. (2003) 295\u2013313","DOI":"10.1007\/3-540-36563-X_20"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Tamassia, R., Triandopoulos, N.: Computational bounds on hierarchical data processing with applications to information security. In: ICALP. (2005) 153\u2013165","DOI":"10.1007\/11523468_13"},{"key":"5_CR14","unstructured":"Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: Enabling authentication of sliding window queries on streams. In: Proc. of Very Large Data Bases (VLDB). (2007)"},{"key":"5_CR15","unstructured":"Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous authentication on data streams. In: Proc. of Very Large Data Bases (VLDB). (2007)"},{"key":"5_CR16","unstructured":"McCurley, K.: The discrete logarithm problem. In: Proc. of the Symposium in Applied Mathematics, American Mathematical Society (1990) 49\u201374"},{"key":"5_CR17","unstructured":"National Institute of Standards and Technology: FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Wang, X., Yin, Y., Yu, H.: Finding collisions in the full sha-1. In: CRYPTO. (2005)","DOI":"10.1007\/11535218_2"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Wang, X., Yao, A., Yao, F.: New collision search for SHA-1 (2005) Presented at the rump session of Crypto 2005.","DOI":"10.1007\/11535218_1"},{"issue":"2","key":"5_CR20","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2) (1988) 96\u201399","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"5_CR21","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM (CACM) 21(2) (1978) 120\u2013126","journal-title":"Communications of the ACM (CACM)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.L.: Authenticating query results in edge computing. In: Proc. of International Conference on Data Engineering (ICDE). (2004) 560\u2013571","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"5_CR23","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Symposium on Network and Distributed Systems Security (NDSS). (2004)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Dsac: Integrity of outsourced databases with signature aggregation and chaining. In: Proc. of Conference on Information and Knowledge Management (CIKM). (2005) 235\u2013236","DOI":"10.1145\/1099554.1099604"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: Immutability for aggregated\/condensed signatures. In: European Symposium on Research in Computer Security (ESORICS). (2004) 160\u2013176","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"5_CR26","unstructured":"Merkle, R.C.: A certified digital signature. In: Proc. of Advances in Cryptology (CRYPTO). (1989) 218\u2013238"},{"key":"5_CR27","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings 7th USENIX Security Symposium (San Antonio, Texas). (1998)"},{"issue":"1","key":"5_CR28","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s00453-003-1076-8","volume":"39","author":"C Martel","year":"2004","unstructured":"Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A general model for authenticated data structures. Algorithmica 39(1) (2004) 21\u201341","journal-title":"Algorithmica"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of ACM Management of Data (SIGMOD). (2006)","DOI":"10.1145\/1142473.1142488"},{"issue":"2","key":"5_CR30","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/356770.356776","volume":"11","author":"D Comer","year":"1979","unstructured":"Comer, D.: The ubiquitous B-tree. ACM Computing Surveys 11(2) (1979) 121\u2013137","journal-title":"ACM Computing Surveys"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Cheng, W., Pang, H., Tan, K.: Authenticating multi-dimensional query results in data publishing. In: DBSec. (2006)","DOI":"10.1007\/11805588_5"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Nuckolls, G.: Verified query results from hybrid authentication trees. In: DBSec. (2005) 84\u201398","DOI":"10.1007\/11535706_7"},{"key":"5_CR33","unstructured":"Micali, S.: Efficient certificate revocation. Technical Report MIT\/LCS\/TM-542b, Massachusetts Institute of Technology, Cambridge, MA (1996)"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: DASFAA. (2006) 420\u2013436","DOI":"10.1007\/11733836_30"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Lazaridis, I., Mehrotra, S.: Progressive approximate aggregate queries with a multi-resolution tree structure. In: Proc. of ACM Management of Data (SIGMOD). (2001) 401\u2013412","DOI":"10.1145\/375663.375718"},{"issue":"12","key":"5_CR36","doi-asserted-by":"publisher","first-page":"1555","DOI":"10.1109\/TKDE.2004.93","volume":"16","author":"Y Tao","year":"2004","unstructured":"Tao, Y., Papadias, D.: Range aggregate processing in spatial databases. IEEE Transactions on Knowledge and Data Engineering (TKDE) 16(12) (2004) 1555\u20131570","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"key":"5_CR37","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index sturctures for aggregation queries in outsourced databases. Technical report, CS Dept., Boston University (2006)]"}],"container-title":["Handbook of Database Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-48533-1_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T02:17:53Z","timestamp":1619576273000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-48533-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387485324"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-48533-1_5","relation":{},"subject":[]}}