{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:40:34Z","timestamp":1743126034993,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540883128"},{"type":"electronic","value":"9783540883135"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_12","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T04:41:44Z","timestamp":1223095304000},"page":"177-191","source":"Crossref","is-referenced-by-count":9,"title":["Access Control Friendly Query Verification for Outsourced Data Publishing"],"prefix":"10.1007","author":[{"given":"Hong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaonan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Windsor","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qihua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"publisher","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic data publication over the internet. Journal of Computer Security\u00a011, 291\u2013314 (2003)","journal-title":"Journal of Computer Security"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B.G., Naughton, J.F.: Middle-tier database caching for e-business. In: SIGMOD (2002)","DOI":"10.1145\/564760.564763"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Saroiu, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of internet content delivery systems. SIGOPS Oper. Syst. Rev.\u00a036(SI) (2002)","DOI":"10.1145\/844128.844158"},{"key":"12_CR4","first-page":"60","volume-title":"Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France","author":"W. Cheng","year":"2006","unstructured":"Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, pp. 60\u201373. Springer, Berlin (2006)"},{"key":"12_CR5","unstructured":"Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: ICDE (2002)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"12_CR8","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: NDSS (2004)"},{"key":"12_CR9","unstructured":"Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)"},{"key":"12_CR10","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium (January 1998)"},{"key":"12_CR11","unstructured":"Merkle, R.C.: Secrecy, Authentication, and Public Key Systems. Ph.D thesis, Stanford University (1979)"},{"key":"12_CR12","unstructured":"Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A general model for authenticated data structures (2001)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006)","DOI":"10.1007\/11805588_5"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.: Authenticating query results in edge computing. In: ICDE, pp. 560\u2013571 (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"12_CR15","unstructured":"Haber, S., Horne, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. Technical Report HPL-2006-128, HP Labs (2006)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB, pp. 898\u2013909 (2003)","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"issue":"10","key":"12_CR17","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2004.63","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and authentic third-party distribution of xml documents. IEEE Transactions on Knowledge and Data Engineering\u00a016(10), 1263\u20131278 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"12_CR18","first-page":"99","volume-title":"CIKM 2005: Proceedings of the 14th ACM international conference on Information and knowledge management","author":"B. Carminati","year":"2005","unstructured":"Carminati, B., Ferrari, E., Bertino, E.: Securing xml data in third-party distribution systems. In: CIKM 2005: Proceedings of the 14th ACM international conference on Information and knowledge management, pp. 99\u2013106. ACM, New York (2005)"},{"issue":"1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00288933","volume":"4","author":"R.A. Finkel","year":"1974","unstructured":"Finkel, R.A., Bentley, J.L.: Quad trees: a data structure for retrieval on composite keys. Acta Informatica\u00a04(1), 1\u20139 (1974)","journal-title":"Acta Informatica"},{"key":"12_CR20","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1145\/800113.803652","volume-title":"STOC 1976: Proceedings of the eighth annual ACM symposium on Theory of computing","author":"J.L. Bentley","year":"1976","unstructured":"Bentley, J.L., Shamos, M.I.: Divide-and-conquer in multidimensional space. In: STOC 1976: Proceedings of the eighth annual ACM symposium on Theory of computing, pp. 220\u2013230. ACM, New York (1976)"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/223\/03131","volume":"223","author":"P. Agarwal","year":"1999","unstructured":"Agarwal, P., Erickson, J.: Geometric range searching and its relatives. Advances in Discrete and Computational GeometryContemporary Mathematics\u00a0223, 1\u201356 (1999)","journal-title":"Advances in Discrete and Computational GeometryContemporary Mathematics"},{"issue":"9","key":"12_CR22","first-page":"362","volume":"80","author":"Y. Chiang","year":"1992","unstructured":"Chiang, Y., Tamassia, R.: Dynamic algorithms in computational geometry. Proceedings of IEEE, Special Issue on Computational Geometry\u00a080(9), 362\u2013381 (1992)","journal-title":"Proceedings of IEEE, Special Issue on Computational Geometry"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T10:54:20Z","timestamp":1738407260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}