{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:47:34Z","timestamp":1725511654069},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540788485"},{"type":"electronic","value":"9783540788492"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78849-2_33","type":"book-chapter","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:49:01Z","timestamp":1209390541000},"page":"319-330","source":"Crossref","is-referenced-by-count":7,"title":["A Secure Multi-dimensional Partition Based Index in DAS"],"prefix":"10.1007","author":[{"given":"Jieping","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoyong","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Providing Database as a Service. In: Proc. of 18th International Conference on Data Engineering, San Jose, CA, USA (February 2002)","DOI":"10.1109\/ICDE.2002.994695"},{"key":"33_CR2","unstructured":"DES. Data encryption standard. FIPS PUB 46, Federal Information Processing Standards Publication, (1977)"},{"key":"33_CR3","unstructured":"Oracle Corporation: Database Encryption in Oracle9i (2001), http:\/\/otn.oracle.com\/deploy\/security\/oracle9i"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database Service Provider Model. In: SIGMOD, Madison, Wisconsin, USA, June 4-6 (2002)","DOI":"10.1145\/564691.564717"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs. In: 10th ACM CCS, Washington (2003)","DOI":"10.1145\/948109.948124"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Tsudik, G.: Aggregation Queries in the Database-As-a-Service. In: IFIP. WG 11.3 Working Conference on Data and Applications Security (DBSec) (July 2006)","DOI":"10.1007\/11805588_7"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., et al.: Security Issues in Querying Encrypted Data. Technical Report, Purdue University, (2004)","DOI":"10.1007\/11535706_24"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A Privacy-Preserving Index for Range Queries. In: Proc. of the 30th VLDB Conference, Toronto, Canada (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proc. of ACM SIGMOD 2004, Paris, France (June 2004)","DOI":"10.1145\/1007568.1007632"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Bouganim, L., Pucheral, L.: Chip-Secured Data Access: Confidential Data on Untrusted Servers. In: Proc. of the 28th VLDB Conference (2002)","DOI":"10.1016\/B978-155860869-6\/50020-2"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-3-540-24741-8_10","volume-title":"Advances in Database Technology - EDBT 2004","author":"B. Iyer","year":"2004","unstructured":"Iyer, B., Mehrotra, S., Mykletun, E., Tsudik, G., Wu, Y.: A Framework for Efficient Storage Security in RDBMS. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., B\u00f6hm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol.\u00a02992, pp. 147\u2013164. Springer, Heidelberg (2004)"},{"key":"33_CR12","unstructured":"Wang, H., Lakshmanan, L.V.S.: Efficient Secure Query Evaluation over Encrypted XML Databases. In: VLDB 2006 (September 2006)"},{"issue":"3","key":"33_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/971701.50205","volume":"17","author":"M. Muralikrishna","year":"1988","unstructured":"Muralikrishna, M., DeWitt, D.J.: Equi-Depth Histograms for Estimating Selectivity Factors for Multi-dimensional Queries. SIGMOD Record\u00a017(3), 28\u201336 (1988)","journal-title":"SIGMOD Record"},{"key":"33_CR14","unstructured":"Poosala, V., Ioannidis, Y.E.: Selectivity Estimation without the Attribute Value Independence Assumption. In: Proceedings of the Twenty-third International Conference on Vary Large Databases (VLDB 1997) (1997)"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Gunopulos, D., Kollios, G., Tsotras, V.J., Domeniconi, C.: Approximating Multi-dimensional Aggregate Range Queries over Real Attributes. In: Proceedings of the 2000 ACM International Conference on Management of Data (SIGMOD 2000) (2000)","DOI":"10.1145\/342009.335448"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Aboulnage, A., Chaudhuri, S.: Self-tuning histograms: Building histograms without looking at data. In: proceedings of the 1999 ACM International Conference on Management of Data (SIGMOD 1999) (1999)","DOI":"10.1145\/304182.304198"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Bruno, N., Chauhuri, S., Gravano, L.: STHoles: A Multidimensional Workload-Aware Histogram. In: proceedings of the 2001 ACM International Conference on Management of Data (SIGMOD 2001) (2001)","DOI":"10.1145\/375663.375686"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"LeFevre, K., Dewitt, D.J., Ramakrishnan, R.: Mondrain Multidimensional K-Anonymity. In: ICDE (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"33_CR19","unstructured":"Blake, C., Keogh, E., Merz, C.: UCI repository of machine learning databases. University of Califonia, Ivrine, Dept. of Informaiton and Computer Science, http:\/\/mlearn.ics.uci.edu\/MLRepository.html"}],"container-title":["Lecture Notes in Computer Science","Progress in WWW Research and Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78849-2_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:02:22Z","timestamp":1619521342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78849-2_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540788485","9783540788492"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78849-2_33","relation":{},"subject":[]}}