{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T18:05:33Z","timestamp":1744826733158},"publisher-location":"Boston, MA","reference-count":15,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_33","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T18:12:08Z","timestamp":1194631928000},"page":"385-396","source":"Crossref","is-referenced-by-count":10,"title":["An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing"],"prefix":"10.1007","author":[{"given":"E.","family":"Damiani","sequence":"first","affiliation":[]},{"given":"S.","family":"De Vimercati","sequence":"additional","affiliation":[]},{"given":"S.","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"S.","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"S.","family":"Paraboschi","sequence":"additional","affiliation":[]},{"given":"P.","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"33_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S. Akl","year":"1983","unstructured":"S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3), 239\u2013248 (August 1983).","journal-title":"ACM Transactions on Computer System"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"M.J. Atallah, K.B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In Proc. of the ACM CCS, Alexandria, VA, USA (November 2005).","DOI":"10.1145\/1102120.1102147"},{"key":"33_CR3","unstructured":"J.C. Birget, X. Zou, G. Noubir, and B. Ramamurthy. Hierarchy-based access control in distributed environments. In Proc. of the IEEE International Conference on Communications, Helsinki, Finland (June 2002)."},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-key encryption with keyword search. In Proc. Eurocrypt 2004, Interlaken, Switzerland (May 2004).","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"L. Bouganim and P. Pucheral. Chip-secured data access: confidential data on untrusted servers. In Proc. of the 28th VLDB Conference, Hong Kong, China (August 2002).","DOI":"10.1016\/B978-155860869-6\/50020-2"},{"issue":"1","key":"33_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A. Ceselli","year":"2005","unstructured":"A. Ceselli, E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Modeling and assessing inference exposure in encrypted databases. ACM TISSEC, 8(1), 119\u2013152 (February 2005).","journal-title":"ACM TISSEC"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the ACM CCS, Washington, DC, USA (October 2003).","DOI":"10.1145\/948121.948124"},{"issue":"5","key":"33_CR8","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1109\/TSE.1980.230489","volume":"6","author":"E. Gudes","year":"1980","unstructured":"E. Gudes. The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, 6(5), 411\u2013420 (September 1980).","journal-title":"IEEE Transactions on Software Engineering"},{"key":"33_CR9","unstructured":"H. Hacig\u00fcm\u00fcs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of the ICDE, San Jose, CA, USA (February 2002)."},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"H. Hacig\u00fcm\u00fcs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD, Madison, Wisconsin, USA (June 2002).","DOI":"10.1145\/564691.564717"},{"key":"33_CR11","unstructured":"E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced database. In Proc. of the 11th Annual Network and Distributed System Security Symposium, San Diego, California, USA (February 2004)."},{"issue":"2","key":"33_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0190(88)90099-3","volume":"27","author":"R.S. Sandhu","year":"1988","unstructured":"R.S. Sandhu. Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27(2), 95\u201398 (April 1988).","journal-title":"Information Processing Letters"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Y. Sun and K.J.R. Liu. Scalable hierarchical access control in secure group communications. In Proc. of the IEEE Infocom, Hong Kong, China (March 2004).","DOI":"10.1109\/INFCOM.2004.1357015"},{"issue":"2","key":"33_CR14","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/0167-4048(95)97049-G","volume":"14","author":"H. Tsai","year":"1995","unstructured":"H. Tsai and C. Chang. A cryptographic implementation for dynamic access control in a user hierarchy. Computer and Security, 14(2), 159\u2013166 (September 1995).","journal-title":"Computer and Security"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"C.K. Wong, M. Gouda, and S.S. Lam. Secure group communications using key graphs. In Proc. of the ACM SIGCOMM, Vancouver, British Columbia (September 1998).","DOI":"10.1145\/285237.285260"}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T14:02:31Z","timestamp":1558360951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_33","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}