{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:29Z","timestamp":1725562769799},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_8","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"113-129","source":"Crossref","is-referenced-by-count":5,"title":["Distributed and Secure Access Control in P2P Databases"],"prefix":"10.1007","author":[{"given":"Angela","family":"Bonifati","sequence":"first","affiliation":[]},{"given":"Ruilin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Gribble, S.D., Halevy, A.Y., Ives, Z.G., Rodrigand, M., Suciu, D.: What Can Database Do for Peer-to-Peer?. In: Proc. of WebDB (2001)"},{"issue":"7\u20138","key":"8_CR2","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.is.2008.01.012","volume":"33","author":"K. Hose","year":"2008","unstructured":"Hose, K., Roth, A., Zeitz, A., Sattler, K.U., Naumann, F.: A research agenda for query processing in large-scale peer data management systems. Inf. Syst.\u00a033(7\u20138), 597\u2013610 (2008)","journal-title":"Inf. Syst."},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1374780.1374781","volume":"37","author":"A. Bonifati","year":"2008","unstructured":"Bonifati, A., Chrysanthis, P.K., Ouksel, A.M., Sattler, K.U.: Distributed databases and peer-to-peer databases: past and present. SIGMOD Rec.\u00a037(1), 5\u201311 (2008)","journal-title":"SIGMOD Rec."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Zhang, X.: Peer to peer access control architecture using trusted computing technology. In: Proc. of ACMT (2005)","DOI":"10.1145\/1063979.1064005"},{"issue":"11","key":"8_CR5","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/356989.357007","volume":"35","author":"J. Kubiatowicz","year":"2000","unstructured":"Kubiatowicz, J., Bindel, D., Chen, Y., Czerwinski, S., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: Oceanstore: an architecture for global-scale persistent storage. SIGPLAN Not.\u00a035(11), 190\u2013201 (2000)","journal-title":"SIGPLAN Not."},{"key":"8_CR6","unstructured":"Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proc. of FAST (2003)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Sturm, C., Hunt, E., Scholl, M.H.: Distributed privilege enforcement in pacs. In: DBSec, pp. 142\u2013158 (2009)","DOI":"10.1007\/978-3-642-03007-9_10"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of VLDB (2003)","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46439-5_8","volume-title":"Advances in Database Technology - EDBT 2000","author":"E. Damiani","year":"2000","unstructured":"Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Sarnarati, P.: Securing xml documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol.\u00a01777, Springer, Heidelberg (2000)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Harrington, A., Jensen, C.: Cryptographic access control in a distributed file system. In: Proc. of ACMT (2003)","DOI":"10.1145\/775412.775432"},{"issue":"11","key":"8_CR11","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Comm. of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Comm. of the ACM"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Chekuri, C., Rajaraman, A.: Conjunctive query containment revisited. In: Proceedings of ICDT, pp. 56\u201370 (1998)","DOI":"10.1007\/3-540-62222-5_36"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Chandra, A.K., Merlin, P.M.: Optimal implementation of conjunctive queries in relational databases. In: Proc. of STC (1977)","DOI":"10.1145\/800105.803397"},{"key":"8_CR14","unstructured":"Saraiya, Y.P.: Subtree-elimination algorithms in deductive databases. In: Thesis, Stanford University (1991)"},{"key":"8_CR15","unstructured":"5200.28-STD, D.S.: Trusted Computer System Evaluation Criteria. USA Dept. of Defense (1985)"},{"key":"8_CR16","unstructured":"Luo, H., Lu, S.: Ubiquitous and robust authentication services for ad hoc wireless networks. Technical report, University of California, Los Angeles (2000)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Joshi, D., Namuduri, K., Pendse, R.: Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis. EURASIP J. Wirel. Commun. Netw.\u00a0(4), 579\u2013589 (2005)","DOI":"10.1155\/WCN.2005.579"},{"key":"8_CR18","unstructured":"P2Pac Web Site, \n                    \n                      http:\/\/staff.icar.cnr.it\/angela\/p2pac\/exp\/exp.html"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Grolimund, D., Meisser, L., Schmid, S., Wattenhofer, R.: Cryptree: A folder tree structure for cryptographic file systems. In: RDS, pp. 189\u2013198 (2006)","DOI":"10.1109\/SRDS.2006.15"},{"issue":"9","key":"8_CR20","first-page":"909","volume":"9","author":"M. Naor","year":"1998","unstructured":"Naor, M., Wool, A.: Access control and signatures via quorum secret sharing. IEEE TPDS\u00a09(9), 909\u2013922 (1998)","journal-title":"IEEE TPDS"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Merwe, J.V.D., Dawoud, D., McDonald, S.: A survey on peer-to-peer key management for mobile ad hoc networks. ACM Comp. Surveys (2007)","DOI":"10.1145\/1216370.1216371"},{"issue":"3","key":"8_CR22","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3233\/JCS-2008-16303","volume":"16","author":"A.V.D.M. Kayem","year":"2008","unstructured":"Kayem, A.V.D.M., Akl, S.G., Martin, P.: On replacing cryptographic keys in hierarchical key management systems. Journal of Computer Security\u00a016(3), 289\u2013309 (2008)","journal-title":"Journal of Computer Security"},{"issue":"2","key":"8_CR23","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/TIFS.2007.897274","volume":"2","author":"Y.L. Sun","year":"2007","unstructured":"Sun, Y.L., Liu, K.J.R.: Analysis and protection of dynamic membership information for group key distribution schemes. IEEE Transactions on Information Forensics and Security\u00a02(2), 213\u2013226 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Blundo, C., Cimato, S., di Vimercati, S.D.C., Santis, A.D., Foresti, S., Paraboschi, S., Samarati, P.: Efficient key management for enforcing access control in outsourced scenarios. In: Proceedings of SEC (2009)","DOI":"10.1007\/978-3-642-01244-0_32"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: Proc. of SIGCOMM (2001)","DOI":"10.1145\/383059.383071"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Ratnasamy, S., Francis, P., Handley, M., Karp, R., Shenker, S.: A scalable content-addressable network. In: Proc. of SIGCOMM (2001)","DOI":"10.1145\/383059.383072"},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330299","volume":"11","author":"P. Mazzoleni","year":"2008","unstructured":"Mazzoleni, P., Crispo, B., Sivasubramanian, S., Bertino, E.: XACML Policy Integration Algorithms. ACM TISS\u00a011(1), 1\u201329 (2008)","journal-title":"ACM TISS"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Fan, W., Chee-Yong Chan, M.G.: Secure xml querying with security views. In: Proc. of SIGMOD 2004 (2004)","DOI":"10.1145\/1007568.1007634"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:21:42Z","timestamp":1558286502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}