{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T16:48:49Z","timestamp":1767372529324},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642177132"},{"type":"electronic","value":"9783642177149"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17714-9_16","type":"book-chapter","created":{"date-parts":[[2010,12,7]],"date-time":"2010-12-07T13:27:24Z","timestamp":1291728444000},"page":"216-230","source":"Crossref","is-referenced-by-count":18,"title":["A Persistent Public Watermarking of Relational Databases"],"prefix":"10.1007","author":[{"given":"Raju","family":"Halder","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","volume":"12","author":"R. Agrawal","year":"2003","unstructured":"Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal\u00a012(2), 157\u2013169 (2003)","journal-title":"The VLDB Journal"},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-3-642-10772-6_19","volume-title":"Information Systems Security","author":"S. Bhattacharya","year":"2009","unstructured":"Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol.\u00a05905, pp. 252\u2013264. Springer, Heidelberg (2009)"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-540-89330-1_2","volume-title":"Programming Languages and Systems","author":"L. Chen","year":"2008","unstructured":"Chen, L., Min\u00e9, A., Cousot, P.: A sound floating-point polyhedra abstract domain. In: Ramalingam, G. (ed.) APLAS 2008. LNCS, vol.\u00a05356, pp. 3\u201318. Springer, Heidelberg (2008)"},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","volume":"176","author":"H. Guo","year":"2006","unstructured":"Guo, H., Li, Y., Liua, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences\u00a0176, 1350\u20131378 (2006)","journal-title":"Information Sciences"},{"key":"16_CR5","unstructured":"Halder, R., Cortesi, A.: Abstract interpretation for sound approximation of database query languages. In: Proceedings of the IEEE 7th International Conference on INFOrmatics and Systems (INFOS 2010), Advances in Data Engineering and Management Track, Cairo, Egypt, March 28-30, pp. 53\u201359. IEEE Catalog Number: IEEE CFP1006J-CDR (2010)"},{"key":"16_CR6","volume-title":"Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC 2010)","author":"R. Halder","year":"2010","unstructured":"Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC 2010), October 4-5. IEEE CS, Calicut (2010)"},{"key":"16_CR7","volume-title":"Proceedings of the 22nd ACM\/IEEE Annual Symposium on Integrated Circuits and System Design (SBCCI 2009)","author":"R. Halder","year":"2009","unstructured":"Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based ip protection scheme for circuit designs using linear feedback shift register (lfsr)-based locking. In: Proceedings of the 22nd ACM\/IEEE Annual Symposium on Integrated Circuits and System Design (SBCCI 2009), August 31-September 3. ACM Press, Natal (2009)"},{"key":"16_CR8","first-page":"254","volume-title":"Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT 2010)","author":"R. Halder","year":"2010","unstructured":"Halder, R., Cortesi, A.: Observation-based fine grained access control for relational databases. In: Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT 2010), July 22-24, vol.\u00a024, pp. 254\u2013265. INSTICC, Athens (2010)"},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1128817.1128832","volume-title":"Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006)","author":"Y. Li","year":"2006","unstructured":"Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2006), pp. 78\u201389. ACM, Taiwan (2006)"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1029146.1029159","volume-title":"Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM 2004)","author":"Y. Li","year":"2004","unstructured":"Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management (DRM 2004), pp. 73\u201382. ACM, Washington (2004)"},{"key":"16_CR11","unstructured":"Lin, E., Delp, E.: A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop (ACM Multimedia 1999), Orlando, pp. 25\u201329 (1999)"},{"key":"16_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1996)"},{"issue":"1","key":"16_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10990-006-8609-1","volume":"19","author":"A. Min\u00e9","year":"2006","unstructured":"Min\u00e9, A.: The octagon abstract domain. Higher Order Symbol. Comput.\u00a019(1), 31\u2013100 (2006)","journal-title":"Higher Order Symbol. Comput."},{"key":"16_CR14","first-page":"169","volume-title":"Foundations of Secure Computation","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169\u2013180. Academic Press, New York (1978)"},{"key":"16_CR15","volume-title":"Proceedings of the 2006 Joint Conference on Information Sciences (JCIS 2006)","author":"M.H. Tsai","year":"2006","unstructured":"Tsai, M.H., Tseng, H.Y., Lai, C.Y.: A database watermarking technique for temper detection. In: Proceedings of the 2006 Joint Conference on Information Sciences (JCIS 2006), October 8-11. Atlantis Press, Kaohsiung (2006)"},{"key":"16_CR16","first-page":"677","volume-title":"First International Conference on Innovative Computing, Information and Control (ICICIC 2006)","author":"Y. Zhang","year":"2006","unstructured":"Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), October 16, pp. 677\u2013680. IEEE CS, Beijing (2006)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17714-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T18:11:16Z","timestamp":1553278276000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17714-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642177132","9783642177149"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17714-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}