{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:20:13Z","timestamp":1747887613805,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_8","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"114-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Index Optimization for L-Diversified Database-as-a-Service"],"prefix":"10.1007","author":[{"given":"Jens","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches.: In Proceedings of the 7th International Conference on Risk and Security of Internet and Systems (CRiSIS), pp. 1\u20139 (2012)","DOI":"10.1109\/CRISIS.2012.6378956"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1, 3 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-22348-8_12","volume-title":"Data and Applications Security and Privacy XXV","author":"AE Nergiz","year":"2011","unstructured":"Nergiz, A.E., Clifton, C.: Query processing in private data outsourcing using anonymization. In: Li, Y. (ed.) DBSec. LNCS, vol. 6818, pp. 138\u2013153. Springer, Heidelberg (2011)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Nergiz, A.E., Clifton, C., Malluhi, Q.M.: Updating outsourced anatomized private databases. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 179\u2013190 (2013)","DOI":"10.1145\/2452376.2452399"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-39256-6_1","volume-title":"Data and Applications Security and Privacy XXVII","author":"S De Capitani di Vimercati","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Extending loose associations to multiple fragments. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 1\u201316. Springer, Heidelberg (2013)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"14:1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. (CSUR) 42, 14:1\u201314:53 (2010)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"05","key":"8_CR7","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Intl. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Intl. J. Uncertainty Fuzziness Knowl. Based Syst."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Bayardo, R., Agrawal, R.: Data privacy through optimal k-anonymization. In: Proceedings of the IEEE 21th International Conference on Data Engineering (ICDE), pp. 217\u2013228 (2005)","DOI":"10.1109\/ICDE.2005.42"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: Proceedings of the IEEE 23th International Conference on Data Engineering (ICDE), pp. 116\u2013125 (2007)","DOI":"10.1109\/ICDE.2007.367857"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 620\u2013629 (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"8_CR11","series-title":"IFIP Advances in Information and Communication Technology","first-page":"17","volume-title":"Trust Management VI","author":"H Kikuchi","year":"2012","unstructured":"Kikuchi, H., Basu, A., Vaidya, J.: Perturbation based privacy preserving slope one predictors for collaborative filtering. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 17\u201335. Springer, Heidelberg (2012)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: Cryptdb: Protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), pp. 85\u2013100 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of SIGMOD (2002)","DOI":"10.1145\/564691.564717"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceedings of CCS (2003)","DOI":"10.1145\/948109.948124"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: On information leakage by indexes over data fragments. In: Proceedings of the 1st International Workshop on Privacy-Preserving Data Publication and Analysis (PrivDB) (2013)","DOI":"10.1109\/ICDEW.2013.6547434"},{"key":"8_CR16","first-page":"22:1","volume":"13","author":"V Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Sys. Secur. (TISSEC) 13, 22:1\u201322:33 (2010)","journal-title":"ACM Trans. Inf. Sys. Secur. (TISSEC)"},{"key":"8_CR17","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proceedings of CIDR (2005)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"J\u00fcnemann, K., K\u00f6hler, J., Hartenstein, H.: Data outsourcing simplified: Generating data connectors from confidentiality and access policies. In: Proceedings of the Workshop on Data-intensive Process Management in Large-Scale Sensor Systems (CCGrid-DPMSS) (2012)","DOI":"10.1109\/CCGrid.2012.117"},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1053283.1053289","volume":"8","author":"A Ceselli","year":"2005","unstructured":"Ceselli, A., Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inform. Sys. Secur. (TISSEC) 8, 119\u2013152 (2005)","journal-title":"ACM Trans. Inform. Sys. Secur. (TISSEC)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"He, Y., Barman, S., Naughton, J.: Preventing equivalence attacks in updated, anonymized data. In: Proceedings of the IEEE 27th International Conference on Data Engineering (ICDE), pp. 529\u2013540 (2011)","DOI":"10.1109\/ICDE.2011.5767924"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Fu, A.W.-C., Pei, J.: Anonymity for continuous data publishing. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 264\u2013275 (2008)","DOI":"10.1145\/1353343.1353378"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: M-invariance: towards privacy preserving re-publication of dynamic datasets. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 689\u2013700 (2007)","DOI":"10.1145\/1247480.1247556"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Zhou, B., Han, Y., Pei, J., Jiang, B., Tao, Y., Jia, Y.: Continuous privacy preserving publishing of data streams. In: Proceedings of the International Conference on Extending Database Technology (EDBT), pp. 648\u2013659 ( 2009)","DOI":"10.1145\/1516360.1516435"},{"issue":"1","key":"8_CR24","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/234313.234367","volume":"28","author":"YE Ioannidis","year":"1996","unstructured":"Ioannidis, Y.E.: Query optimization. ACM Comput. Surv. (CSUR) 28(1), 121\u2013123 (1996)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Chaudhuri, S.: An overview of query optimization in relational systems. In: Proceedings of the 17th ACM Symposium on Principles of Database Systems (PODS), pp. 34\u201343 (1998)","DOI":"10.1145\/275487.275492"},{"issue":"4","key":"8_CR26","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1002\/sam.10016","volume":"1","author":"PJ Haas","year":"2009","unstructured":"Haas, P.J., Ilyas, I.F., Lohman, G.M., Markl, V.: Discovering and exploiting statistical properties for query optimization in relational databases: a survey. Stat. Anal. Data Min. 1(4), 223\u2013250 (2009)","journal-title":"Stat. Anal. Data Min."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Goldstein, J., Larson, P.-A.: Optimizing queries using materialized views: a practical, scalable solution. In: Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 331-342 (2001)","DOI":"10.1145\/376284.375706"},{"key":"8_CR28","unstructured":"Chaudhuri, S., Krishnamurthy, R., Potamianos, S., Shim, K.: Optimizing queries with materialized views. In: Proceedings of the 11th International conference on Data Engineering, pp. 190\u2013200 (1995)"},{"key":"8_CR29","doi-asserted-by":"crossref","unstructured":"Hellerstein, J.M., Stonebraker, M.: Predicate migration: Optimizing querieswith expensive predicates. In: Proceedings of the 1993 ACM International Conference on Managementof Data (SIGMOD), pp. 267\u2013276 (1993)","DOI":"10.1145\/170036.170078"},{"key":"8_CR30","unstructured":"http:\/\/dsn.tm.kit.edu\/english\/dividat.php"},{"key":"8_CR31","volume-title":"The Art of Computer System Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling","author":"R Jain","year":"1991","unstructured":"Jain, R.: The Art of Computer System Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling. John Wiley, New York (1991)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T18:12:59Z","timestamp":1747851179000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}