{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:04:17Z","timestamp":1767182657767,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319100814"},{"type":"electronic","value":"9783319100821"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10082-1_8","type":"book-chapter","created":{"date-parts":[[2014,8,4]],"date-time":"2014-08-04T00:49:05Z","timestamp":1407113345000},"page":"212-243","source":"Crossref","is-referenced-by-count":23,"title":["Encryption and Fragmentation for Data Confidentiality in the Cloud"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Robert F.","family":"Erbacher","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Livraga","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR 2005, Asilomar, CA, USA (January 2005)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of SIGMOD 2004, Paris, France (June 2004)","DOI":"10.1145\/1007568.1007632"},{"issue":"7","key":"8_CR3","doi-asserted-by":"publisher","first-page":"634","DOI":"10.14778\/2180912.2180916","volume":"5","author":"M. Benedikt","year":"2012","unstructured":"Benedikt, M., Bourhis, P., Ley, C.: Querying schemas with access restrictions. Proc. of VLDB Endowment\u00a05(7), 634\u2013645 (2012)","journal-title":"Proc. of VLDB Endowment"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-642-24861-0_17","volume-title":"Information Security","author":"J. Biskup","year":"2011","unstructured":"Biskup, J., Preu\u00df, M., Wiese, L.: On the inference-proofness of database fragmentation satisfying confidentiality constraints. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol.\u00a07001, pp. 246\u2013261. Springer, Heidelberg (2011)"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A. Ceselli","year":"2005","unstructured":"Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM TISSEC\u00a08(1), 119\u2013152 (2005)","journal-title":"ACM TISSEC"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y.-C. Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-74835-9_12","volume-title":"Computer Security \u2013 ESORICS 2007","author":"V. Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 171\u2013186. Springer, Heidelberg (2007)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation design for efficient query execution over sensitive distributed databases. In: Proc. of ICDCS 2009, Montreal, Canada (June 2009)","DOI":"10.1109\/ICDCS.2009.52"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V. Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: Outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.\u00a05789, pp. 440\u2013455. Springer, Heidelberg (2009)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC\u00a013(3), 22:1\u201322:33 (2010)","DOI":"10.1145\/1805974.1805978"},{"issue":"3","key":"8_CR11","doi-asserted-by":"publisher","first-page":"531","DOI":"10.3233\/JCS-2011-0422","volume":"19","author":"V. Ciriani","year":"2011","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data outsourcing for enforcing privacy. JCS\u00a019(3), 531\u2013566 (2011)","journal-title":"JCS"},{"issue":"5","key":"8_CR12","doi-asserted-by":"publisher","first-page":"463","DOI":"10.3233\/JCS-2012-0449","volume":"20","author":"V. Ciriani","year":"2012","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Livraga, G., Samarati, P.: An OBDD approach to enforce confidentiality and visibility constraints in data publishing. JCS\u00a020(5), 463\u2013508 (2012)","journal-title":"JCS"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proc. of CCS 2006, Alexandria, VA, USA (October-November 2006)","DOI":"10.1145\/1180405.1180417"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS 2003, Washington, DC, USA (October 2003)","DOI":"10.1145\/948121.948124"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2013.01.008","volume":"39","author":"S. De Capitani di Vimercati","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Computers & Security\u00a039, 47\u201363 (2013)","journal-title":"Computers & Security"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE TDSC (to appear, 2014)","DOI":"10.1109\/TDSC.2013.2295798"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS\u00a035(2), 12:1\u201312:46 (2010)","DOI":"10.1145\/1735886.1735891"},{"issue":"2","key":"8_CR18","first-page":"187","volume":"1","author":"S. Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE TCC\u00a01(2), 187\u2013200 (2013)","journal-title":"IEEE TCC"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proc. of ICDCS 2011, Minneapolis, MN, USA (June 2011)","DOI":"10.1109\/ICDCS.2011.37"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of CRiSIS 2012, Cork, Ireland (October 2012)","DOI":"10.1109\/CRISIS.2012.6378956"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Protecting data in outsourcing scenarios. In: Das, S., Kant, K., Zhang, N. (eds.) Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann (2012)","DOI":"10.1016\/B978-0-12-415815-3.00014-5"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Selective and fine-grained access to data in the cloud. In: Jajodia, S., Kant, K., Samarati, P., Swarup, V., Wang, C. (eds.) Secure Cloud Computing. Springer (2014)","DOI":"10.1007\/978-1-4614-9278-8_6"},{"key":"8_CR23","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proc. of STOC 2009, Bethesda, MA, USA (May 2009)","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR25","unstructured":"Goh, E.J.: Secure indexes. Tech. Rep. 2003\/216, Cryptology ePrint Archive (2003), \n                  \n                    http:\/\/eprint.iacr.org\/"},{"key":"8_CR26","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of ICDE 2002, San Jose, CA, USA (February 2002)"},{"key":"8_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","volume-title":"Database Systems for Advanced Applications","author":"H. Hac\u0131g\u00fcm\u00fc\u015f","year":"2004","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance management in IaaS clouds. In: Proc. of ESTEL 2012, Rome, Italy (October 2012)","DOI":"10.1109\/ESTEL.2012.6400113"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance and resilience in cloud computing environments. In: Vacca, J. (ed.) Computer and Information Security Handbook, 2nd edn., pp. 125\u2013141. Morgan Kaufmann (2013)","DOI":"10.1016\/B978-0-12-394397-2.00007-6"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proc. of CSE 2012, Paphos, Cyprus (December 2012)","DOI":"10.1109\/ICCSE.2012.32"},{"key":"8_CR31","unstructured":"\u00d6zsu, M., Valduriez, P.: Principles of distributed database systems, 2nd edn. Prentice-Hall, Inc. (1999)"},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-319-06320-1_4","volume-title":"Information Security Practice and Experience","author":"P. Samarati","year":"2014","unstructured":"Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol.\u00a08434, pp. 28\u201341. Springer, Heidelberg (2014)"},{"key":"8_CR33","unstructured":"Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons (1996)"},{"issue":"8","key":"8_CR34","first-page":"1467","volume":"23","author":"C. Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE TPDS\u00a023(8), 1467\u20131479 (2012)","journal-title":"IEEE TPDS"},{"key":"8_CR35","unstructured":"Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of VLDB 2006, Seoul, Korea (September 2006)"},{"key":"8_CR36","doi-asserted-by":"crossref","unstructured":"Winkler, V.: Securing the Cloud: Cloud Computer Security Techniques and Tactics. Syngress (2011)","DOI":"10.1016\/B978-1-59749-592-9.00005-1"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10082-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T09:20:40Z","timestamp":1558948840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10082-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319100814","9783319100821"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10082-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}