{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:46:38Z","timestamp":1725489998413},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540735335"},{"type":"electronic","value":"9783540735380"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73538-0_14","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T23:45:05Z","timestamp":1187221505000},"page":"177-194","source":"Crossref","is-referenced-by-count":6,"title":["Design and Analysis of Querying Encrypted Data in Relational Databases"],"prefix":"10.1007","author":[{"given":"Mustafa","family":"Canim","sequence":"first","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Jr, T.Z.: An ominous milestone: 100 million data leaks. New York Times (December 18,2006)"},{"key":"14_CR2","unstructured":"Trinanes, J.A.: Database security in high risk environments.Technical report, governmentsecurity.org (2005), \n                    \n                      http:\/\/www.governmentsecurity.org\/articles\/DatabaseSecurityinHighRiskEn%vironments.php"},{"key":"14_CR3","unstructured":"Standard for privacy of individually identifiable health information. Federal Register\u00a067(157), 53181\u201353273 (2002)"},{"key":"14_CR4","unstructured":"California database security breach notification act (September 2002), \n                    \n                      http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/sen\/sb_1351-1400\/sb_1386_bill_%_20020926_chaptered.html"},{"key":"14_CR5","unstructured":"Microsoft: Security features in microsoft sql server 2005. Technical report, Microsoft Corporation (2005), \n                    \n                      http:\/\/www.microsoft.com\/sql\/2005\/productinfo\/"},{"key":"14_CR6","unstructured":"IBM: Ibm data encryption for ims and db2 databases. Technical report, IBM Corporation (2006), \n                    \n                      http:\/\/www-306.ibm.com\/software\/data\/db2imstools\/db2tools\/ibmencrypt.html"},{"key":"14_CR7","volume-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data","author":"R. Agrawal","year":"2004","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, ACM Press, New York (2004)"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/320434.320445","volume":"1","author":"R. Bayer","year":"1976","unstructured":"Bayer, R., Metzger, J.K.: On the encipherment of search trees and random access files. ACM Trans. Database Syst.\u00a01(1), 37\u201352 (1976), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/320434.320445","journal-title":"ACM Trans. Database Syst."},{"key":"14_CR9","unstructured":"Hardjono, T., Seberry, J.: Search key substitution in the encipherment of b-trees. In: McLeod, D., Sacks-Davis, R., Schek, H.J. (eds.) 16th International Conference on Very Large Data Bases, Brisbane, Queensland, Australia, Proceedings, August 13-16, 1990, pp. 50\u201358. Morgan Kaufmann (1990)"},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the 2002 ACM SIGMOD In ternational Conference on Management of Data","author":"H. Hacigumus","year":"2002","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June 4-6, 2002, pp. 216\u2013227. ACM Press, New York (2002), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/564691.564717"},{"key":"14_CR11","volume-title":"Proceedings of the 30th International Conference on Very Large Data Bases","author":"B. Hore","year":"2004","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of the 30th International Conference on Very Large Data Bases, Morgan Kaufmann Publishers Inc., San Francisco (2004)"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/948109.948124","volume-title":"Proceedings of the 10th ACM conference on Computer and communications security","author":"E. Damiani","year":"2003","unstructured":"Damiani, E., Vimercati, S.D.C., Jodia, S.J., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 93\u2013102. ACM Press, New York (2003), \n                    \n                      http:\/\/doi.acm.org\/10.1145\/948109.948124"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24741-8_10","volume-title":"Advances in Database Technology - EDBT 2004","author":"B. Iyer","year":"2004","unstructured":"Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A framework for efficient storage security in rdbms. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, Springer, Heidelberg (2004)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_3","volume-title":"Secure Data Management","author":"Y. Elovici","year":"2004","unstructured":"Elovici, Y., Shmueli, E., nberg, R.W., Gudes, E.: A structure preserving database encryption scheme. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2004. LNCS, vol.\u00a03178, Springer, Heidelberg (2004), \n                    \n                      http:\/\/www.extra.research.philips.com\/sdm-workshop\/RonenSDM.pdf"},{"key":"14_CR15","unstructured":"NIST: Advanced encryption standard (aes). Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology (2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"14_CR16","unstructured":"Recommendation for block cipher modes of operation methods and techniques. Technical Report NIST Special Publication 800-38A, National Institute of Standards and Technology (2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-38a\/sp800-38a.pdf"},{"key":"14_CR17","unstructured":"Data encryption standard (des). Technical Report FIPS PUB 46-2, National Institutes of Standards and Technology\u00a0(1988)"},{"key":"14_CR18","unstructured":"Schneier, B.: The blowfish encryption algorithm. Dr. Dobb\u2019s Journal, 38\u201340 (April 1994)"},{"key":"14_CR19","unstructured":"Lipmaa, H., Rogaway, P., Wagner, D.: Ctr-mode encryption. In: NIST, Computer Security Resource Center, First Modes of Operation Workshop (2000), \n                    \n                      http:\/\/csrc.nist.gov\/CryptoToolkit\/modes\/workshop1\/papers\/lipmaa-ctr.pdf"},{"key":"14_CR20","unstructured":"Cox, M., Engelschall, R., Henson, S., Laurie, B.: The OpenSSL Project, \n                    \n                      http:\/\/www.openssl.org\/"},{"key":"14_CR21","unstructured":"IBM: Table Space Design, \n                    \n                      http:\/\/publib.boulder.ibm.com\/infocenter\/db2luw\/v9\/index.jsp?topic=\/com%.ibm.db2.udb.admin.doc\/doc\/c0004935.htm"},{"key":"14_CR22","volume-title":"Selected Areas in Cryptography 1998","author":"H. Lipmaa","year":"1998","unstructured":"Lipmaa, H.: A cipher for muldimedia architectures? In: Tavares, S., Meijer, H. (eds.) Selected Areas in Cryptography 1998, Springer, Heidelberg (1998)"},{"key":"14_CR23","first-page":"169","volume-title":"Proceedings of the 27th International Conference on Very Large Data Bases","author":"A. Ailamaki","year":"2001","unstructured":"Ailamaki, A., DeWitt, D.J., Hill, M.D., Skounakis, M.: Weaving relations for cache performance. In: Proceedings of the 27th International Conference on Very Large Data Bases, pp. 169\u2013180. Morgan Kaufmann Publishers Inc, San Francisco (2001)"},{"issue":"11","key":"14_CR24","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security XXI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73538-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T14:16:53Z","timestamp":1550845013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73538-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540735335","9783540735380"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73538-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}