{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:02:29Z","timestamp":1773406949001,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642020551","type":"print"},{"value":"9783642020568","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_8","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T22:43:27Z","timestamp":1244241807000},"page":"117-132","source":"Crossref","is-referenced-by-count":3,"title":["Detection and Prevention of Insider Threats in Database Driven Web Services"],"prefix":"10.1007","author":[{"given":"Tzvi","family":"Chumash","sequence":"first","affiliation":[]},{"given":"Danfeng","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","first-page":"65","volume-title":"Proceedings of the 1997 IEEE Symposium on Security and Privacy","author":"W.A. Arbaugh","year":"1997","unstructured":"Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65\u201371. IEEE Computer Society, Los Alamitos (1997)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Bertino, E., Ooi, B.C., Yang, Y., Deng, R.H.: Privacy and ownership preserving of outsourced medical data. In: Proceedings of the 21st International Conference on Data Engineering (ICDE), pp. 521\u2013532 (2005)","DOI":"10.1109\/ICDE.2005.111"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. Journal of Computer Security\u00a011(3) (2003)","DOI":"10.3233\/JCS-2003-11302"},{"key":"8_CR4","unstructured":"Dickinson, P.: Top 7 PHP Security Blunders (December 2005), http:\/\/www.sitepoint.com\/article\/php-security-blunders\/"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (August 2008), http:\/\/www.ietf.org\/rfc\/rfc5246.txt","DOI":"10.17487\/rfc5246"},{"issue":"6","key":"8_CR6","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2002.1009167","volume":"35","author":"I. Foster","year":"2002","unstructured":"Foster, I., Kesselman, C., Nick, J.M., Tuecke, S.: Grid services for distributed system integration. Computer\u00a035(6), 37\u201346 (2002)","journal-title":"Computer"},{"key":"8_CR7","unstructured":"GoDaddy.com. Why You Need An SSL Certificate, https:\/\/www.godaddy.com\/gdshop\/pdf\/SSLMarketingGuideGodaddy.pdf"},{"key":"8_CR8","unstructured":"Trusted\u00a0Computing Group. TCG 1.2 specifications, https:\/\/www.trustedcomputinggroup.org\/"},{"key":"8_CR9","first-page":"216","volume-title":"Proceedings of ACM SIGMOD Conference on Management of Data","author":"H. Hacig\u00fcm\u00fcs","year":"2002","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service provider model. In: Proceedings of ACM SIGMOD Conference on Management of Data, pp. 216\u2013227. ACM Press, New York (2002)"},{"key":"8_CR10","unstructured":"Hacig\u00fcm\u00fcs, H.B., Iyer, H.B., Mehrotra, S.: Providing database as a service. In: Proceedings of International Conference on Data Engineering (ICDE) (March 2002)"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","volume-title":"Database Systems for Advanced Applications","author":"H. Hacig\u00fcm\u00fcs","year":"2004","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"8_CR12","unstructured":"Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest we remember: Cold boot attacks on encryption keys. In: van Oorschot, P.C. (ed.) USENIX Security Symposium, pp. 45\u201360. USENIX Association (2008)"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010, 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"8_CR14","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/SP.1980.10006","volume-title":"Proceedings of the 1980 Symposium on Security and Privacy","author":"R. Merkle","year":"1980","unstructured":"Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122\u2013133. IEEE Computer Society Press, Los Alamitos (1980)"},{"key":"8_CR15","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. In: Proceedings of Symposium on Network and Distributed Systems Security (NDSS) (February 2004)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/11805588_7","volume-title":"Data and Applications Security XX","author":"E. Mykletun","year":"2006","unstructured":"Mykletun, E., Tsudik, G.: Aggregation queries in the database-as-a-service model. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 89\u2013103. Springer, Heidelberg (2006)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11733836_30","volume-title":"Database Systems for Advanced Applications","author":"M. Narasimha","year":"2006","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882, pp. 420\u2013436. Springer, Heidelberg (2006)"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pp. 407\u2013418 (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"8_CR19","unstructured":"Shiflett, C.: Security corner: Shared hosting. php\u2014architect\u00a0 3(3) (March 2004), http:\/\/shiflett.org\/articles\/shared-hosting"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Xu, G., Borcea, C., Iftode, L.: Satem: Trusted service code execution across transactions. In: IEEE Symposium on Reliable Distributed Systems, pp. 321\u2013336 (2006)","DOI":"10.1109\/SRDS.2006.42"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T00:40:25Z","timestamp":1633567225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}