{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T20:10:01Z","timestamp":1748463001902,"version":"3.41.0"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_2","type":"book-chapter","created":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T03:47:00Z","timestamp":1434944820000},"page":"19-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Collaborative Query Planning in Multi-party Database Networks"],"prefix":"10.1007","author":[{"given":"Mingyi","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Lobo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"2_CR1","unstructured":"Bent, G., Dantressangle, P., Vyvyan, D., Mowshowitz, A., Mitsou, V.: A dynamic distributed federated database. In: Second Annual Conference of ITA, Imperial College, London (2008)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. In: 2007 IEEE Symposium on Security and Privacy, SP 2007, pp. 222\u2013230. IEEE (2007)","DOI":"10.1109\/SP.2007.21"},{"issue":"4","key":"2_CR3","doi-asserted-by":"crossref","first-page":"751","DOI":"10.3233\/JCS-2010-0413","volume":"19","author":"S Capitani di Vimercati De","year":"2011","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Authorization enforcement in distributed query evaluation. J. Comput. Secur. 19(4), 751\u2013794 (2011)","journal-title":"J. Comput. Secur."},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-642-23822-2_34","volume-title":"Computer Security \u2013 ESORICS 2011","author":"NL Farnan","year":"2011","unstructured":"Farnan, N.L., Lee, A.J., Chrysanthis, P.K., Yu, T.: Don\u2019t reveal my intension: protecting user privacy using declarative preferences during distributed query processing. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 628\u2013647. Springer, Heidelberg (2011)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Farnan, N.L., Lee, A.J., Chrysanthis, P.K., Yu, T.: Paqo: preference-aware query optimization for decentralized database systems. In: IEEE 30th International Conference on Data Engineering (ICDE) (2014)","DOI":"10.1109\/ICDE.2014.6816670"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Farnan, N.L., Lee, A.J., Yu, T.: Investigating privacy-aware distributed query evaluation. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, pp. 43\u201352. ACM (2010)","DOI":"10.1145\/1866919.1866926"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/371578.371598","volume":"32","author":"D Kossmann","year":"2000","unstructured":"Kossmann, D.: The state of the art in distributed query processing. ACM Comput. Surv. (CSUR) 32(4), 422\u2013469 (2000)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-642-39256-6_20","volume-title":"Data and Applications Security and Privacy XXVII","author":"M Le","year":"2013","unstructured":"Le, M., Kant, K., Jajodia, S.: Rule enforcement with third parties in secure cooperative data access. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 282\u2013288. Springer, Heidelberg (2013)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1007\/978-3-662-43936-4_15","volume-title":"Data and Applications Security and Privacy XXVIII","author":"M Le","year":"2014","unstructured":"Le, M., Kant, K., Jajodia, S.: Consistent query plan generation in secure cooperative data access. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 227\u2013242. Springer, Heidelberg (2014)"},{"key":"2_CR10","volume-title":"Principles of Distributed Database Systems","author":"MT \u00d6zsu","year":"2011","unstructured":"\u00d6zsu, M.T., Valduriez, P.: Principles of Distributed Database Systems. Springer, New York (2011)"},{"key":"2_CR11","unstructured":"Papadimos, V., Maier, D.: Distributed queries without distributed state. In: Proceedings of WebDB 2002, pp. 95\u2013100 (2002)"},{"issue":"2","key":"2_CR12","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1145\/1138394.1138397","volume":"31","author":"F Pentaris","year":"2006","unstructured":"Pentaris, F., Ioannidis, Y.: Query optimization in distributed networks of autonomous database systems. ACM Trans. Database Syst. (TODS) 31(2), 537\u2013583 (2006)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Stonebraker, M., Devine, R., Kornacker, M., Litwin, W., Pfeffer, A., Sah, A., Staelin, C.: An economic paradigm for query processing and data migration in mariposa. In: 1994 Proceedings of the Third International Conference on Parallel and Distributed Information Systems, pp. 58\u201367. IEEE (1994)","DOI":"10.1109\/PDIS.1994.331732"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1109\/TKDE.2014.2357018","volume":"27","author":"Q Zeng","year":"2014","unstructured":"Zeng, Q., Zhao, M., Liu, P., Yadav, P., Calo, S., Lobo, J.: Enforcement of autonomous authorizations in collaborative distributed query evaluation. IEEE Trans. Knowl. Data Eng. 27, 979\u2013992 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T19:43:15Z","timestamp":1748461395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}