{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:12:22Z","timestamp":1750997542112,"version":"3.41.0"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694580"},{"type":"electronic","value":"9783319694597"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69459-7_1","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T04:19:29Z","timestamp":1508473169000},"page":"3-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Property Preserving Encryption in NoSQL Wide Column Stores"],"prefix":"10.1007","author":[{"given":"Tim","family":"Waage","sequence":"first","affiliation":[]},{"given":"Lena","family":"Wiese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"issue":"1","key":"1_CR1","first-page":"17","volume":"65","author":"T O\u2019Reilly","year":"2007","unstructured":"O\u2019Reilly, T.: What is web 2.0: design patterns and business models for the next generation of software. Commun. Strat. 65(1), 17\u201337 (2007)","journal-title":"Commun. Strat."},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Han, J., Haihong, E., Le, G., Du, J.: Survey on NoSQL database. In: 2011 6th International Conference on Pervasive Computing and Applications (ICPCA), pp. 363\u2013366. IEEE (2011)","DOI":"10.1109\/ICPCA.2011.6106531"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Tudorica, B.G., Bucur, C.: A comparison between several NoSQL databases with comments and notes. In: 2011 10th Roedunet International Conference (RoEduNet), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/RoEduNet.2011.5993686"},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/1365815.1365816","volume":"26","author":"F Chang","year":"2008","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. ACM Trans. Comput. Syst. 26(2), 4 (2008)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"2","key":"1_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Operating Syst. Rev. 44(2), 35\u201340 (2010)","journal-title":"ACM SIGOPS Operating Syst. Rev."},{"key":"1_CR6","unstructured":"Alex, H., Schoen, S., Heninger, N., Clarkson, W., Paul, W., Calandrino, J., Feldman, A., Appelbaum, J., Felten, E.: Lest we forget - cold boot attacks on encryption keys (2008)"},{"key":"1_CR7","unstructured":"Corkery, M.: Once Again, Thieves Enter Swift Financial Network and Steal, New York Times (2016). http:\/\/www.nytimes.com\/2016\/05\/13\/business\/dealbook\/swift-global-bank-network-attack.html. Accessed 20 Mar 2017"},{"key":"1_CR8","unstructured":"Lennon, M.: Hackers Used Sophisticated SMB Worm Tool to Attack Sony, Security Week (2016). http:\/\/www.securityweek.com\/hackers-used-sophisticated-smb-worm-tool-attack-sony. Accessed 20 Mar 2017"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Quinn, B., Arthur, C.: Playstation network hackers access data of 77 million users, The Guardian (2011). https:\/\/www.theguardian.com\/technology\/2011\/apr\/26\/playstation-network-hackers-data. Accessed 20 Mar 2017","DOI":"10.1016\/S1353-4858(11)70054-X"},{"key":"1_CR10","unstructured":"Crawford, D., Fuhrmans, V., Ball, D.: Germany Tackles Tax Evasion, Wall Street Journal (2010). http:\/\/www.wsj.com\/articles\/SB10001424052748704197104575051480386248538. Accessed 20 Mar 2017"},{"key":"1_CR11","unstructured":"Solid-IT: DB-engines ranking (2017). https:\/\/db-engines.com\/de\/ranking. Accessed 20 Mar 2017"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Borthakur, D., Gray, J., Sarma, J.S., Muthukkaruppan, K., Spiegelberg, N., Kuang, H., Ranganathan, K., Molkov, D., Menon, A., Rash, S., et al.: Apache hadoop goes realtime at Facebook. In: Proceedings of the 2011 ACM SIGMOD International Conference on Management of Data, pp. 1071\u20131080. ACM (2011)","DOI":"10.1145\/1989323.1989438"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of data, pp. 216\u2013227. ACM (2002)","DOI":"10.1145\/564691.564717"},{"issue":"9","key":"1_CR14","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2330667.2330691","volume":"55","author":"RA Popa","year":"2012","unstructured":"Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: processing queries on an encrypted database. Commun. ACM 55(9), 103\u2013111 (2012)","journal-title":"Commun. ACM"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Shahzad, F., Iqbal, W., Bokhari, F.S.: On the use of CryptDB for securing electronic health data in the cloud: a performance study. In: 2015 17th International Conference on E-health Networking, Application and Services (HealthCom), pp. 120\u2013125. IEEE (2015)","DOI":"10.1109\/HealthCom.2015.7454484"},{"issue":"10","key":"1_CR16","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1145\/2544173.2509554","volume":"48","author":"SD Tetali","year":"2013","unstructured":"Tetali, S.D., Lesani, M., Majumdar, R., Millstein, T.: MrCrypt: static analysis for secure cloud computations. ACM SIGPLAN Not. 48(10), 271\u2013286 (2013)","journal-title":"ACM SIGPLAN Not."},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Akin, I.H., Sunar, B.: On the difficulty of securing web applications using CryptDB. In: 2014 IEEE Fourth International Conference on Big Data and Cloud Computing (BdCloud), pp. 745\u2013752. IEEE (2014)","DOI":"10.1109\/BDCloud.2014.75"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"289","DOI":"10.14778\/2535573.2488336","volume":"6","author":"S Tu","year":"2013","unstructured":"Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. Proc. VLDB Endowment 6, 289\u2013300 (2013)","journal-title":"Proc. VLDB Endowment"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Pappas, V., Krell, F., Vo, B., Kolesnikov, V., Malkin, T., Choi, S.G., George, W., Keromytis, A., Bellovin, S.: Blind seer: a scalable private DBMS. In: IEEE Symposium on Security and Privacy, vol. 2014, pp. 359\u2013374. IEEE (2014)","DOI":"10.1109\/SP.2014.30"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Sarfraz, M.I., Nabeel, M., Cao, J., Bertino, E.: DBMask: fine-grained access control on encrypted relational databases. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 1\u201311. ACM (2015)","DOI":"10.1145\/2699026.2699101"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.knosys.2014.04.010","volume":"79","author":"J Li","year":"2015","unstructured":"Li, J., Liu, Z., Chen, X., Xhafa, F., Tan, X., Wong, D.S.: L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl.-Based Syst. 79, 18\u201326 (2015)","journal-title":"Knowl.-Based Syst."},{"key":"1_CR22","unstructured":"Kasten, A., Scherp, A., Armknecht, F., Krause, M.: Towards search on encrypted graph data. In: Proceedings of PrivOn (2013)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Yuan, X., Wang, X., Wang, C., Qian, C., Lin, J.: Building an encrypted, distributed, and searchable key-value store. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 547\u2013558. ACM (2016)","DOI":"10.1145\/2897845.2897852"},{"key":"1_CR24","first-page":"591","volume":"2016","author":"R Poddar","year":"2016","unstructured":"Poddar, R., Boelter, T., Popa, R.A.: Arx: a strongly encrypted database system. IACR Cryptology ePrint Arch. 2016, 591 (2016)","journal-title":"IACR Cryptology ePrint Arch."},{"key":"1_CR25","unstructured":"Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: Orthogonal security with cipherbase. In: CIDR (2013)"},{"issue":"3","key":"1_CR26","doi-asserted-by":"publisher","first-page":"752","DOI":"10.1109\/TKDE.2013.38","volume":"26","author":"S Bajaj","year":"2014","unstructured":"Bajaj, S., Sion, R.: TrustedDB: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans. Knowl. Data Eng. 26(3), 752\u2013765 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1_CR27","unstructured":"Khetrapal, A., Ganesh, V.: HBase and hypertable for large scale distributed storage systems. Department of Computer Science, Purdue University, pp. 22\u201328 (2006)"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Sawyer, S.M., O\u2019Gwynn, B.D., Tran, A., Yu, T.: Understanding query performance in Accumulo. In: 2013 IEEE High Performance Extreme Computing Conference (HPEC), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/HPEC.2013.6670330"},{"key":"1_CR29","unstructured":"Cooney, M.: IBM touts encryption innovation, Network World (2009). http:\/\/www.networkworld.com\/article\/2259168\/data-center\/ibm-touts-encryption-innovation.html. Accessed 20 Mar 2017"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Kadhem, H., Amagasa, T., Kitagawa, H.: A secure and efficient order preserving encryption scheme for relational databases. In: KMIS, pp. 25\u201335 (2010)","DOI":"10.5220\/0003095700250035"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"A Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578\u2013595. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-22792-9_33"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Liu, D., Wang, S.: Programmable order-preserving secure index for encrypted database query. In: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD), pp. 502\u2013509. IEEE (2012)","DOI":"10.1109\/CLOUD.2012.65"},{"key":"1_CR33","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 463\u2013477. IEEE (2013)","DOI":"10.1109\/SP.2013.38"},{"key":"1_CR34","doi-asserted-by":"crossref","unstructured":"Wozniak, S., Rossberg, M., Grau, S., Alshawish, A., Schaefer, G.: Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes. In: Proceedings of the 2013 ACM Workshop on Cloud Computing Security Workshop, pp. 89\u2013100. ACM (2013)","DOI":"10.1145\/2517488.2517496"},{"key":"1_CR35","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Schr\u00f6pfer, A.: Optimal average-complexity ideal-security order-preserving encryption. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 275\u2013286. ACM (2014)","DOI":"10.1145\/2660267.2660277"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-662-52993-5_24","volume-title":"Fast Software Encryption","author":"N Chenette","year":"2016","unstructured":"Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical order-revealing encryption with limited leakage. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 474\u2013493. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-52993-5_24"},{"key":"1_CR37","first-page":"216","volume":"2003","author":"EJ Goh","year":"2003","unstructured":"Goh, E.J., et al.: Secure indexes. IACR Cryptology ePrint Arch. 2003, 216 (2003)","journal-title":"Secure indexes. IACR Cryptology ePrint Arch."},{"key":"1_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). doi:10.1007\/11496137_30"},{"key":"1_CR39","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"1_CR40","doi-asserted-by":"crossref","unstructured":"Sedghi, S., Van Liesdonk, P., Doumen, J.M., Hartel, P.H., Jonker, W.: Adaptively secure computationally efficient searchable symmetric encryption (2009)","DOI":"10.1007\/978-3-642-15546-8_7"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-15546-8_7","volume-title":"Secure Data Management","author":"P van Liesdonk","year":"2010","unstructured":"van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., Jonker, W.: Computationally efficient searchable symmetric encryption. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 87\u2013100. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15546-8_7"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 965\u2013976. ACM (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 310\u2013320. ACM (2014)","DOI":"10.1145\/2660267.2660297"},{"key":"1_CR44","first-page":"1","volume":"72","author":"NS Jho","year":"2015","unstructured":"Jho, N.S., Chang, K.Y., Hong, D., Seo, C.: Symmetric searchable encryption with efficient range query using multi-layered linked chains. J. Supercomputing 72, 1\u201314 (2015)","journal-title":"J. Supercomputing"},{"key":"1_CR45","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 2000 IEEE Symposium on Security and Privacy, S&P 2000, Proceedings, pp. 44\u201355. IEEE (2000)"},{"key":"1_CR46","first-page":"1","volume":"174","author":"R Anderson","year":"1998","unstructured":"Anderson, R., Biham, E., Knudsen, L.: Serpent: a proposal for the advanced encryption standard. NIST AES Proposal 174, 1\u201323 (1998)","journal-title":"NIST AES Proposal"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Roche, D., Apon, D., Choi, S.G., Yerukhimov, A.: POPE: Partial order-preserving encoding. Technical report, Cryptology ePrint Arch. 2015\/1106 (2015)","DOI":"10.1145\/2976749.2978345"},{"key":"1_CR48","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1016\/j.jnca.2014.07.001","volume":"59","author":"Z Liu","year":"2014","unstructured":"Liu, Z., Chen, X., Yang, J., Jia, C., You, I.: New order preserving encryption model for outsourced databases in cloud environments. J. Netw. Comput. Appl. 59, 198\u2013207 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Mavroforakis, C., Chenette, N., O\u2019Neill, A., Kollios, G., Canetti, R.: Modular order-preserving encryption, revisited. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, pp. 763\u2013777. ACM (2015)","DOI":"10.1145\/2723372.2749455"},{"key":"1_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-01001-9_13"},{"issue":"9","key":"1_CR51","doi-asserted-by":"publisher","first-page":"2520","DOI":"10.1587\/transinf.E93.D.2520","volume":"93","author":"H Kadhem","year":"2010","unstructured":"Kadhem, H., Amagasa, T., Kitagawa, H.: MV-OPES: multivalued-order preserving encryption scheme: a novel scheme for encrypting integer value to many different values. IEICE Trans. Inf. Syst. 93(9), 2520\u20132533 (2010)","journal-title":"IEICE Trans. Inf. Syst."},{"issue":"2","key":"1_CR52","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/2636328","volume":"47","author":"C B\u00f6sch","year":"2015","unstructured":"B\u00f6sch, C., Hartel, P., Jonker, W., Peter, A.: A survey of provably secure searchable encryption. ACM Comput. Surv. (CSUR) 47(2), 18 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, pp. 85\u2013100. ACM (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Waage, T., Homann, D., Wiese, L.: Practical application of order-preserving encryption in wide column stores. In: Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - SECRYPT, pp. 352\u2013359 (2016)","DOI":"10.5220\/0005991403520359"},{"key":"1_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-319-30303-1_19","volume-title":"Foundations and Practice of Security","author":"T Waage","year":"2016","unstructured":"Waage, T., Jhajj, R.S., Wiese, L.: Searchable encryption in apache cassandra. In: Garcia-Alfaro, J., Kranakis, E., Bonfante, G. (eds.) FPS 2015. LNCS, vol. 9482, pp. 286\u2013293. Springer, Cham (2016). doi:10.1007\/978-3-319-30303-1_19"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems. OTM 2017 Conferences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69459-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T15:53:26Z","timestamp":1750953206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-69459-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694580","9783319694597"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69459-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"21 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}