{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T17:10:02Z","timestamp":1746119402387,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":23,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_7","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"149-169","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Collaborative Data Authorization Between Enterprise Clouds"],"prefix":"10.1007","author":[{"given":"Meixing","family":"Le","sequence":"first","affiliation":[]},{"given":"Krishna","family":"Kant","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"7_CR1","unstructured":"G. Aggarwal, M. Bawa, P. Ganesan, and etc. Two can keep A secret: A distributed architecture for secure database services. In CIDR 2005, pages 186\u2013199."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li. Sovereign joins. In, ICDE 2006, 3\u20138 April 2006, Atlanta, GA, USA, page 26, 2006.","DOI":"10.1109\/ICDE.2006.144"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1145\/320083.320091","volume":"4","author":"A. V. Aho","year":"1979","unstructured":"A. V. Aho, C. Beeri, and J. D. Ullman. The theory of joins in relational databases. ACM Transactions on Database Systems, 4(3):297\u2013314, 1979.","journal-title":"ACM Transactions on Database Systems"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/JSAC.2009.090406","volume":"27","author":"E. Al-Shaer","year":"2009","unstructured":"E. Al-Shaer, A. El-Atawy, and T. Samak. Automated pseudo-live testing of firewall config- uration enforcement. IEEE Journal on Selected Areas in Communications, 27(3):302\u2013314, 2009.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1145\/319628.319650","volume":"6","author":"P. A. Bernstein","year":"1981","unstructured":"P. A. Bernstein, N. Goodman, E. Wong, C. L. Reeve, and J. B. Rothnie, Jr. Query processing in a system for distributed databases (SDD-1). ACM Transactions on Database Systems, 6(4):602\u2013625, Dec. 1981.","journal-title":"ACM Transactions on Database Systems"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"A. Cali and D. Martinenghi. Querying data under access limitations. In ICDE 2008, April 7\u201312, 2008, Cancun, Mexico, pages 50\u201359, 2008.","DOI":"10.1109\/ICDE.2008.4497413"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"S. De Capitani di Vimercati, S.Foresti, S.Jajodia, S.Paraboschi, and P.Samarati. Keep a few: Outsourcing data while maintaining confidentiality. In ESORICS 2009, pages 440\u2013455.","DOI":"10.1007\/978-3-642-04444-1_27"},{"issue":"2\u20133","key":"7_CR8","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/s007780100048","volume":"10","author":"R. Pottinger","year":"2001","unstructured":"R. Pottinger and A. Y. Halevy. Minicon: A scalable algorithm for answering queries using views. VLDB Journal, 10(2\u20133):182\u2013198, 2001.","journal-title":"VLDB Journal"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"M. Le, K. Kant, and S. Jajodia. Access rule consistency in cooperative data access environment. In 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2012.","DOI":"10.4108\/icst.collaboratecom.2012.250467"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"M. Le, K. Kant, and S. Jajodia. Rule configuration checking in secure cooperative data access. In 5th Symposium on Configuration Analytics and Automation (SafeConfig), 2012.","DOI":"10.1007\/978-3-319-01433-3_8"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"M. Le, K. Kant, and S. Jajodia. Rule enforcement with third parties in secure cooperative data access. In 27th IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), 2013.","DOI":"10.1007\/978-3-642-39256-6_20"},{"issue":"6","key":"7_CR12","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2004.2","volume":"37","author":"A. Wool","year":"2004","unstructured":"A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6):62\u201367, 2004.","journal-title":"IEEE Computer"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Assessing query privileges via safe and efficient permission composition. In CCS 2008, Virginia, USA, October 27\u201331, 2008.","DOI":"10.1145\/1455770.1455810"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Controlled information sharing in collaborative distributed query processing. In ICDCS 2008, Beijing, China, June 2008.","DOI":"10.1109\/ICDCS.2008.62"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"J. Goldstein and P. Larson. Optimizing queries using materialized views: A practical, scalable solution. In SIGMOD 2001, pages 331\u2013342.","DOI":"10.1145\/376284.375706"},{"issue":"4","key":"7_CR16","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/s007780100054","volume":"10","author":"A. Y. Halevy","year":"2001","unstructured":"A. Y. Halevy. Answering queries using views: A survey. VLDB Journal,10(4):270\u2013294,2001.","journal-title":"VLDB Journal"},{"issue":"4","key":"7_CR17","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/371578.371598","volume":"32","author":"D. Kossmann","year":"2000","unstructured":"D. Kossmann. The state of the art in distributed query processing. ACM Comput. Survey, 32(4):422\u2013469, 2000.","journal-title":"ACM Comput. Survey"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s00778-002-0085-6","volume":"12","author":"C. Li","year":"2003","unstructured":"C. Li. Computing complete answers to queries in the presence of limited access patterns. VLDB Journal, 12(3):211\u2013227, 2003.","journal-title":"VLDB Journal"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"K. Hoffman, D. Zage, and C. Nita-Rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys (CSUR), vol. 42, no. 1, p. 1, 2009.","DOI":"10.1145\/1592451.1592452"},{"key":"7_CR20","unstructured":"M. Le, K. Kant, and S. Jajodia. Consistent query plan generation in secure cooperative data access. Under submission. http:\/\/mason.gmu.edu\/~mlep\/submission.pdf"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"R. K. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B. S. Lee, Trustcloud: A framework for accountability and trust in cloud computing, in Services (SERVICES), 2011 IEEE World Congress on, 2011, pp. 584\u2013588.","DOI":"10.1109\/SERVICES.2011.91"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"J. Buchmann, E. Dahmen, E. Klintsevich, K. Okeya, and C. Vuillaume, Merkle signa- tures with virtually unlimited signature capacity, in Applied Cryptography and Net- work Security, 2007, pp. 31\u201345.","DOI":"10.1007\/978-3-540-72738-5_3"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"C. Wang, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1\u20139.","DOI":"10.1109\/INFCOM.2010.5462173"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:50:51Z","timestamp":1746118251000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_7","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}