{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:40:04Z","timestamp":1752446404078,"version":"3.41.2"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030812416"},{"type":"electronic","value":"9783030812423"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81242-3_6","type":"book-chapter","created":{"date-parts":[[2021,7,14]],"date-time":"2021-07-14T03:04:02Z","timestamp":1626231842000},"page":"96-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Distributed Query Evaluation over Encrypted Data"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0793-3551","authenticated-orcid":false,"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1658-6734","authenticated-orcid":false,"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3210-558X","authenticated-orcid":false,"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2661-8573","authenticated-orcid":false,"given":"Giovanni","family":"Livraga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0399-1738","authenticated-orcid":false,"given":"Stefano","family":"Paraboschi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7395-4620","authenticated-orcid":false,"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,14]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Asonov, D., Kantarcioglu, M., Li, Y.: Sovereign joins. In: Proceedings of ICDE, Atlanta, GA, USA, April 2006","DOI":"10.1109\/ICDE.2006.144"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Alkowaileet, W., et al.: End-to-end machine learning with Apache AsterixDB. In: Proceedings of DEEM. Houston, TX, USA, June 2018","DOI":"10.1145\/3209889.3209894"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Amarilli, A., Benedikt, M.: When can we answer queries using result-bounded data interfaces? In: Proceedings of PODS, Houston, TX, USA, June 2018","DOI":"10.1145\/3196959.3196965"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Armbrust, M., et al.: Spark SQL: relational data processing in Spark. In: Proceedings of SIGMOD, Melbourne, Australia, May\u2013June 2015","DOI":"10.1145\/2723372.2742797"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bater, J., Elliott, G., Eggen, C., Goel, S., Kho, A., Duggan, J.: SMCQL: secure query processing for private data networks. PVLDB 10(6), 673\u2013684 (2017)","DOI":"10.14778\/3055330.3055334"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Benedikt, M., Leblay, J., Tsamoura, E.: Querying with access patterns and integrity constraints. PVLDB 8(6), 690\u2013701 (2015)","DOI":"10.14778\/2735703.2735708"},{"key":"6_CR7","unstructured":"Chow, S.S., Lee, J.H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: Proceedings of NDSS, San Diego, CA, USA, February 2009"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE TDSC 11(6), 510\u2013523 (2014)","DOI":"10.1109\/TDSC.2013.2295798"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: An authorization model for multi-provider queries. PVLDB 11(3), 256\u2013268 (2017)","DOI":"10.14778\/3157794.3157796"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Authorization enforcement in distributed query evaluation. JCS 19(4), 751\u2013794 (2011)","DOI":"10.3233\/JCS-2010-0413"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Dimitrova, E., Chrysanthis, P., Lee, A.: Authorization-aware optimization for multi-provider queries. In: Proceedings of SAC, Limassol, Cyprus, April 2019","DOI":"10.1145\/3297280.3299731"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Farnan, N., Lee, A., Chrysanthis, P., Yu, T.: PAQO: preference-aware query optimization for decentralized database systems. In: Proceedings of ICDE, Chicago, IL, USA, March\u2013April 2014","DOI":"10.1109\/ICDE.2014.6816670"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Guarnieri, M., Basin, D.: Optimal security-aware query processing. PVLDB 7(12), 1307\u20131318 (2014)","DOI":"10.14778\/2732977.2733003"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD, Madison, WI, USA, June 2002","DOI":"10.1145\/564716.564717"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kossmann, D.: The state of the art in distributed query processing. ACM CSUR 32(4), 422\u2013469 (2000)","DOI":"10.1145\/371578.371598"},{"key":"6_CR16","unstructured":"Kwakye, M.M., Barker, K.: Privacy-preservation in the integration and querying of multidimensional data models. In: Proceedings of PST, Auckland, New Zealand, December 2016"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Levy, A.Y., Srivastava, D., Kirk, T.: Data model and query evaluation in global information systems. JIIS 5(2), 121\u2013143 (1995)","DOI":"10.1007\/BF00962627"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Oktay, K.Y., Kantarcioglu, M., Mehrotra, S.: Secure and efficient query processing over hybrid clouds. In: Proceedings of ICDE, San Diego, CA, USA, April 2017","DOI":"10.1109\/ICDE.2017.125"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Popa, R., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of SOSP, Cascais, Portugal, October 2011","DOI":"10.1145\/2043556.2043566"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Rheinl\u00e4nder, A., Leser, U., Graefe, G.: Optimization of complex dataflows with user-defined functions. ACM CSUR 50(3), 38:1\u201338:39 (2017)","DOI":"10.1145\/3078752"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: Proceedings of SIGMOD, Paris, France, June 2004","DOI":"10.1145\/1007568.1007631"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Salvaneschi, G., K\u00f6hler, M., Sokolowski, D., Haller, P., Erdweg, S., Mezini, M.: Language-integrated privacy-aware distributed queries. In: Proceedings of the ACM on Programming Languages, vol. 3 (2019)","DOI":"10.1145\/3360593"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Sharma, S., Burtsev, A., Mehrotra, S.: Advances in cryptography and secure hardware for data outsourcing. In: IEEE ICDE, Dallas, TX, USA, April 2020","DOI":"10.1109\/ICDE48307.2020.00173"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Tu, S., Kaashoek, M., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. PVLDB 6(5), 289\u2013300 (2013)","DOI":"10.14778\/2535573.2488336"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Zeng, Q., Zhao, M., Liu, P., Yadav, P., Calo, S., Lobo, J.: Enforcement of autonomous authorizations in collaborative distributed query evaluation. IEEE TKDE 27(4), 979\u2013992 (2015)","DOI":"10.1109\/TKDE.2014.2357018"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXV"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81242-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,13]],"date-time":"2025-07-13T22:03:11Z","timestamp":1752444191000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81242-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030812416","9783030812423"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81242-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Calgary, AB","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wpsites.ucalgary.ca\/dbsec2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}