{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:01:16Z","timestamp":1761580876916,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642201486"},{"type":"electronic","value":"9783642201493"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20149-3_10","type":"book-chapter","created":{"date-parts":[[2011,4,8]],"date-time":"2011-04-08T22:41:56Z","timestamp":1302302516000},"page":"108-122","source":"Crossref","is-referenced-by-count":14,"title":["Privacy Preserving Query Processing on Secret Share Based Data Storage"],"prefix":"10.1007","author":[{"given":"XiuXia","family":"Tian","sequence":"first","affiliation":[]},{"given":"ChaoFeng","family":"Sha","sequence":"additional","affiliation":[]},{"given":"XiaoLing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"AoYing","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"11","key":"10_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Communications of the ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Communications of the ACM"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of the 18th ICDE Conf., pp. 29\u201338 (2002)","DOI":"10.1109\/ICDE.2002.994695"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the ACM SIGMOD Conf., pp. 216\u2013227 (2002)","DOI":"10.1145\/564716.564717"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/11587552_2","volume-title":"Middleware 2005","author":"F. Emekci","year":"2005","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E.: Abacus: A distributed middleware for privacy preserving data sharing across private data warehouses. In: Alonso, G. (ed.) Middleware 2005. LNCS, vol.\u00a03790, pp. 21\u201341. Springer, Heidelberg (2005)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Emekci, F., Agrawal, D., Abbadi, A.E., Gulbeden, A.: Privacy preserving query processing using third parties. In: Proc. of 22th ICDE Conf. (2006)","DOI":"10.1109\/ICDE.2006.116"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Abbadi, A.E., Emekci, F., Metwally, A.: Datamanagement as a service:challenges and opportunities. Keynotes. In: Proc. of the 25th ICDE Conf. (2009)","DOI":"10.1109\/ICDE.2009.151"},{"key":"10_CR7","unstructured":"Aggarwal, G., Bawa, M., Ganesan, P., Garcia-Molina, H., Kenthapadi, K., Motwani, R., Srivastava, U., Thomas, D., Xu, Y.: Two can keep a secret: A distributed architecture for secure database services. In: Proc. of CIDR Conf., Asilomar, CA, pp. 186\u2013199 (2005)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proc. of the ACM SIGMOD Conf., pp. 563\u2013574 (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proc. of the 30th VLDB Conf., Toronto, Canada, pp. 720\u2013731 (2004)","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/11535706_6","volume-title":"Data and Applications Security XIX","author":"J. Li","year":"2005","unstructured":"Li, J., Omiecinski, R.: Efficiency, security trade-off in supporting range queries on encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol.\u00a03654, pp. 69\u201383. Springer, Heidelberg (2005)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Shmueli, E., Waisenberg, R., Elovici, Y., Gudes, E.: Designing secure indexes for encrypted databases. In: Proc. of the IFIP Conf. on Database and Application Security (2005)","DOI":"10.1007\/11535706_5"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Anciaux, N., Benzine, M., Bouganim, L., Pucheral, P., Shasha, D.: Ghostdb:querying visible and hidden data without leaks. In: Proc. of the ACM SIGMOD Conf., pp. 677\u2013688 (2007)","DOI":"10.1145\/1247480.1247555"},{"key":"10_CR13","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley Sons, Chichester (1996)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Mattsson, U.: Database encryption-how to balance security with performance. Protegrity Corp. (2005)","DOI":"10.2139\/ssrn.670561"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20149-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T23:57:31Z","timestamp":1741132651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20149-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642201486","9783642201493"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20149-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}