{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:52:26Z","timestamp":1742989946263,"version":"3.40.3"},"publisher-location":"New York, NY","reference-count":53,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_6","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"123-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Selective and Fine-Grained Access to Data in the Cloud"],"prefix":"10.1007","author":[{"given":"Sabrina De Capitani","family":"di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"6_CR1","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR 2005. Asilomar, CA, USA (January 2005)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: Proc. of ICDE 2006. Atlanta, GA, USA (April 2006)","DOI":"10.1109\/ICDE.2006.144"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of SIGMOD 2004. Paris, France (June 2004)","DOI":"10.1145\/1007568.1007632"},{"issue":"1","key":"6_CR4","doi-asserted-by":"crossref","first-page":"123","DOI":"10.3233\/JCS-2010-0367","volume":"18","author":"C.A. Ardagna","year":"2010","unstructured":"Ardagna, C.A., Camenisch, J., Kohlweiss, M., Leenes, R., Neven, G., Priem, B., Samarati, P., Sommer, D., Verdicchio, M.: Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project. JCS 18(1), 123\u2013160 (2010)","journal-title":"JCS"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., De Capitani di Vimercati Sabrina, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In: Proc. of PASSAT 2010. Minneapolis, MN, USA (August 2010)","DOI":"10.1109\/SocialCom.2010.115"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., De Capitani di Vimercati Sabrina, S., Foresti, S., Paraboschi, S., Samarati, P.: Supporting privacy preferences in credential-based interactions. In: Proc. of WPES 2010. Chicago, IL, USA (October 2010)","DOI":"10.1145\/1866919.1866931"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., De Capitani di Vimercati Sabrina, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimising disclosure of client information in credential-based interactions. IJIPSI 1(2\/3), 205\u2013233 (2012)","DOI":"10.1504\/IJIPSI.2012.046133"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., De Capitani di Vimercati Sabrina, S., Paraboschi, S., Pedrini, E., Samarati, P., Verdicchio, M.: Expressive and deployable access control in open Web service applications. IEEE TSC 4(2), 96\u2013109 (April-June 2011)","DOI":"10.1109\/TSC.2010.29"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ardagna, C.A., Jajodia, S., Samarati, P., Stavrou, A.: Providing users\u2019 anonymity in mobile hybrid networks. ACM TOIT (2013)","DOI":"10.1145\/2461321.2461322"},{"issue":"3","key":"6_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1455526.1455531","volume":"12","author":"M. Atallah","year":"2009","unstructured":"Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM TISSEC 12(3), 18:1\u201318:43 (January 2009)","journal-title":"ACM TISSEC"},{"key":"6_CR11","unstructured":"Bertoni, G., Breveglieri, L., Koren, I., Maistri, P., Piuri, V.: On the propagation of faults and their detection in a hardware implementation of the advanced encryption standard. In: Proc. of ASAP 2002. San Jose, CA, USA (July 2002)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Blanton, M., Frikken, K.: Efficient multi-dimensional key management in broadcast services. In: Proc. of ESORICS 2010. Athens, Grece (September 2010)","DOI":"10.1007\/978-3-642-15497-3_26"},{"issue":"3","key":"6_CR13","doi-asserted-by":"crossref","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the Web. JCS 10(3), 241\u2013272 (2002)","journal-title":"JCS"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Proc. of EUROCRYPT 2003. Warsaw, Poland (May 2003)","DOI":"10.1007\/3-540-39200-9_26"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Cal\u00ec, A., Martinenghi, D.: Querying data under access limitations. In: Proc. of ICDE 2008. Cancun, Mexico (April 2008)","DOI":"10.1109\/ICDE.2008.4497413"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Proc. of EUROCRYPT 2001. Innsbruck, Austria (May 2001)","DOI":"10.1007\/3-540-44987-6_7"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Ceselli, A., Damiani, E., De Capitani di Vimercati Sabrina, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC 8(1), 119\u2013152 (February 2005)","DOI":"10.1145\/1053283.1053289"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. Journal of ACM 45(6), 965\u2013981 (April 1998)","journal-title":"Journal of ACM"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008. Anaheim, CA, USA (December 2008)","DOI":"10.1109\/ACSAC.2008.13"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Proc. of ESORICS 2009. Saint Malo, France (September 2009)","DOI":"10.1007\/978-3-642-04444-1_27"},{"issue":"3","key":"6_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V. Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1\u201322:33 (July 2010)","journal-title":"ACM TISSEC"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati Sabrina, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003. Washington, DC, USA (October 2003)","DOI":"10.1145\/948109.948124"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Livraga, G. Paraboschi, S., Samarati, P.: Enforcing Dynamic Write Privileges in Data Outsourcing. COSE 39(A), 47\u201363 (November 2013)","DOI":"10.1016\/j.cose.2013.01.008"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1\u201312:46 (April 2010)","DOI":"10.1145\/1735886.1735891"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: Respecting privacy in data publishing. PVLDB 3(1), 1370\u20131381 (September 2010)","DOI":"10.14778\/1920841.1921009"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Authorization enforcement in distributed query evaluation. JCS 19(4), 751\u2013794 (2011)","DOI":"10.3233\/JCS-2010-0413"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private data indexes for selective access to outsourced data. In: Proc. of WPES 2011. Chicago, IL, USA (October 2011)","DOI":"10.1109\/ICDCS.2011.37"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: On information leakage by indexes over data fragments. In: Proc. of PrivDB 2013. Brisbane, Australia (April 2013)","DOI":"10.1109\/ICDEW.2013.6547434"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011. Minneapolis, MN, USA (June 2011)","DOI":"10.1109\/ICDCS.2011.37"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency in private data outsourcing. In: Proc. of ESORICS 2011. Leuven, Belgium (September 2011)","DOI":"10.1007\/978-3-642-23822-2_35"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati Sabrina, S., Foresti, S., Samarati, P.: Protecting data in outsourcing scenarios. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann (2012)","DOI":"10.1016\/B978-0-12-415815-3.00014-5"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009. Bethesda, MA, USA (May 2009)","DOI":"10.1145\/1536414.1536440"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless Oblivious RAM simulation. In: Proc. of SODA 2012. Kyoto, Japan (January 2012)","DOI":"10.1137\/1.9781611973099.14"},{"key":"6_CR34","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002. San Jose, CA, USA (February 2002)"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: Proc. of DBSec 2003. Estes Park, CO, USA (August 2003)","DOI":"10.1007\/1-4020-8070-0_5"},{"key":"6_CR36","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Proc. of DASFAA 2004. Jeju Island, Korea (March 2004)","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD 2002. Madison, WI, USA (June 2002)","DOI":"10.1145\/564691.564717"},{"key":"6_CR38","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012. Rome, Italy (October 2012)","DOI":"10.1109\/ESTEL.2012.6400113"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012. Paphos, Cyprus (December 2012)","DOI":"10.1109\/ICCSE.2012.32"},{"key":"6_CR40","unstructured":"K\u00e4rger, P., Olmedilla, D., Balke, W.T.: Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations. In: Proc. of SDM 2008. Auckland, New Zealand (August 2008)"},{"key":"6_CR41","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of SIGMOD 2006. Chicago, IL, USA (June 2006)","DOI":"10.1145\/1142473.1142488"},{"key":"6_CR42","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB 2003. Berlin, Germany (September 2003)","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"issue":"2","key":"6_CR43","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E. Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS 2(2), 107\u2013138 (May 2006)","journal-title":"ACM TOS"},{"key":"6_CR44","doi-asserted-by":"crossref","unstructured":"Samarati, P., De Capitani di Vimercati Sabrina, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proc. of ASIACCS 2010. Beijing, China (April 2010)","DOI":"10.1145\/1755688.1755690"},{"key":"6_CR45","unstructured":"Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006. Seoul, Korea (September 2006)"},{"key":"6_CR46","doi-asserted-by":"crossref","unstructured":"Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proc. of CIKM 2008. Napa Valley, CA, USA (October 2008)","DOI":"10.1145\/1458082.1458196"},{"key":"6_CR47","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proc. of CCS 2012. Raleigh, NC, USA (October 2012)","DOI":"10.1145\/2382196.2382229"},{"key":"6_CR48","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage. In: Proc. of CCS 2008. Alexandria, VA, USA (October 2008)","DOI":"10.1145\/1455770.1455790"},{"issue":"1","key":"6_CR49","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/90.836475","volume":"8","author":"C. Wong","year":"2000","unstructured":"Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. IEEE\/ACM TON 8(1), 16\u201330 (February 2000)","journal-title":"IEEE\/ACM TON"},{"key":"6_CR50","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of VLDB 2007. Vienna, Austria (September 2007)"},{"key":"6_CR51","doi-asserted-by":"crossref","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: Proc. of EDBT 2008. Nantes, France (March 2008)","DOI":"10.1145\/1353343.1353384"},{"key":"6_CR52","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: Proc. of SIGMOD 2009. Providence, RI, USA (June-July 2009)","DOI":"10.1145\/1559845.1559849"},{"issue":"1","key":"6_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1410234.1410240","volume":"12","author":"D. Yao","year":"2008","unstructured":"Yao, D., Frikken, K., Atallah, M., Tamassia, R.: Private information: To reveal or not to reveal. ACM TISSEC 12(1), 1\u201327 (October 2008)","journal-title":"ACM TISSEC"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T04:44:04Z","timestamp":1674535444000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_6","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}