{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:38:48Z","timestamp":1742945928771,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":25,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461482666"},{"type":"electronic","value":"9781461482659"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-1-4614-8265-9_328","type":"book-chapter","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:25:47Z","timestamp":1544102747000},"page":"3338-3345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Data Outsourcing"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"328_CR19193","unstructured":"Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of the 36th Annual Symposium on Foundations of Computer Science; 1995."},{"key":"328_CR19194","unstructured":"Islam M, Kuzu M, Kantarcioglu M. Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the Network and Distributed Systems Security Symposium; 2012."},{"issue":"3","key":"328_CR19195","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"Oded Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R. Software protection and simulation on oblivious rams. J ACM. 1996;43(3):431\u2013473.","journal-title":"Journal of the ACM"},{"key":"328_CR19196","unstructured":"Devanbu P, Gertz M, Martel C, Stubblebine SG. Authentic third-party data publication. In: Proceedings of the IFIP TC11\/ WG11.3 14th Annual Working Conference on Database Security; 2000."},{"key":"328_CR19197","doi-asserted-by":"crossref","unstructured":"Tang T, Liu L, Wang T, Hu X, Sailer R, Pietzuch P. Outsourcing multi-version key-value stores with verifiable data freshness. In: Proceedings of the IEEE 30th International Conference on Data Engineering; 2014.","DOI":"10.1109\/ICDE.2014.6816744"},{"key":"328_CR19198","unstructured":"Pang H, Tan K. Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering; 2004."},{"issue":"10","key":"328_CR19199","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2004.63","volume":"16","author":"E Bertino","year":"2004","unstructured":"Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents. IEEE Trans Knowl Data Eng. 2004;16(10):1263\u201378.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"328_CR19200","doi-asserted-by":"crossref","unstructured":"Carminati B, Ferrari E, Bertino E. Securing XML data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management; 2005.","DOI":"10.1145\/1099554.1099575"},{"key":"328_CR19201","doi-asserted-by":"crossref","unstructured":"Devanbu P, Gertz M, Kwong A, Martel C, Nuckolls G, Stubblebine SG. Flexible authentication of XML documents. In: Proceedings of the 8th ACM Conference on Computer and Communication Security; 2001.","DOI":"10.1145\/501983.502003"},{"key":"328_CR19202","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Lynn B, Shacham H. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology; 2003.","DOI":"10.1007\/3-540-39200-9_26"},{"key":"328_CR19203","unstructured":"Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases. In: Proceedings of the 11th Annual Symposium on Network and Distributed System Security; 2004."},{"key":"328_CR19204","doi-asserted-by":"crossref","unstructured":"Narasimha M, Tsudik G. Authentication of outsourced databases using signature aggregation and chaining. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2006.","DOI":"10.1007\/11733836_30"},{"key":"328_CR19205","doi-asserted-by":"crossref","unstructured":"Pang H, Jain A, Ramamritham K, Tan K. Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2005.","DOI":"10.1145\/1066157.1066204"},{"key":"328_CR19206","doi-asserted-by":"crossref","unstructured":"Sahai A, Waters B. Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques; 2005.","DOI":"10.1007\/11426639_27"},{"key":"328_CR19207","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security; 2006.","DOI":"10.1145\/1180405.1180418"},{"key":"328_CR19208","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of the IEEE Symposium of Security and Privacy; 2007.","DOI":"10.1109\/SP.2007.11"},{"key":"328_CR19209","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f H, Iyer B, Li C, Mehrotra S. Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2002.","DOI":"10.1145\/564691.564717"},{"key":"328_CR19210","doi-asserted-by":"crossref","unstructured":"Hacigumus H, Iyer B, Li C, Mehrotra S. Efficient execution of aggregation queries over encrypted relational databases. In: Proceedings of the 11th International Conference on Database Systems for Advanced Applications; 2004.","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"328_CR19211","unstructured":"Rivest R, Adleman L, Dertouzos M. On data banks and privacy homomorphisms. In: Lipton RJ, Dobkin DP, Jones AK, editors. Foundations of secure computation. Academic; 1978. p. 169\u201378."},{"key":"328_CR19212","doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J, Srikant R, Xu Y. Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004.","DOI":"10.1145\/1007568.1007632"},{"key":"328_CR19213","unstructured":"Song DX, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy; 2000."},{"key":"328_CR19214","doi-asserted-by":"crossref","unstructured":"Goh E. Secure indexes, cryptology ePrint archive, Report 2003\/216; 2003.","DOI":"10.1108\/09696470310476981"},{"key":"328_CR19215","doi-asserted-by":"crossref","unstructured":"Chang Y, Mitzenmacher M. Privacy preserving keyword searches on remote encrypted data, Cryptology ePrint Archive, Report; 2004.","DOI":"10.1007\/11496137_30"},{"key":"328_CR19216","doi-asserted-by":"crossref","unstructured":"Golle P, Staddon J, Waters B. Secure conjunctive keyword search over encrypted data. In: Proceedings of the Applied Cryptography and Network Security Conference; 2004.","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"328_CR19217","unstructured":"Boneh D, Waters B. Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th Conference on Theory of Cryptography; 2007."}],"container-title":["Encyclopedia of Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-8265-9_328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T19:22:07Z","timestamp":1662578527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-8265-9_328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9781461482666","9781461482659"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-8265-9_328","relation":{},"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}