{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:32:21Z","timestamp":1725489141872},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642322808"},{"type":"electronic","value":"9783642322815"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32281-5_12","type":"book-chapter","created":{"date-parts":[[2012,8,13]],"date-time":"2012-08-13T12:59:36Z","timestamp":1344862776000},"page":"114-126","source":"Crossref","is-referenced-by-count":6,"title":["Continuous Skyline Queries with Integrity Assurance in Outsourced Spatial Databases"],"prefix":"10.1007","author":[{"given":"Xin","family":"Lin","sequence":"first","affiliation":[]},{"given":"Jianliang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Junzhong","family":"Gu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: The R*-tree: An Efficient and Robust Access Method for Points and Rectangles. In: SIGMOD (1990)","DOI":"10.1145\/93597.98741"},{"key":"12_CR2","unstructured":"Berg, M., Cheong, O., Kreveld, M.: Computational Geometry: Algorithms and Applications, 3rd edn., ch. 7 (2008) ISBN: 978-3-540-77973-5"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Chen, Q., Yang, Z.: Authenticating Location-based Services without Compromising Location Privacy. In: SIGMOD (2012)","DOI":"10.1145\/2213836.2213871"},{"issue":"12","key":"12_CR4","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1109\/TKDE.2006.185","volume":"18","author":"Z. Huang","year":"2006","unstructured":"Huang, Z., Lu, H., Ooi, B.C., Tong, K.H.: Continuous Skyline Queries for Moving Objects. IEEE Trans. on Knowledge and Data Engineering (TKDE)\u00a018(12), 1645\u20131658 (2006)","journal-title":"IEEE Trans. on Knowledge and Data Engineering (TKDE)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic Authenticated Index Structures for Outsourced Databases. In: Proc. SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"12_CR7","unstructured":"Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams. In: VLDB (2007)"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Lin, X., Xu, J., Hu, H.: Authentication of Location-based Skyline Queries. In: CIKM (2011)","DOI":"10.1145\/2063576.2063805"},{"key":"12_CR9","unstructured":"Lin, X., Xu, J., Hu, H.: Range-based Skyline Queries in Mobile Environments. TKDE (in press, 2012)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying Completeness of Relational Query Results in Data Publishing. In: Proc. SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Pang, H., Mouratidis, K.: Authenticating the Query Results of Text Search Engines. PVLDB (2008)","DOI":"10.14778\/1453856.1453875"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-02982-0_7","volume-title":"Advances in Spatial and Temporal Databases","author":"S. Papadopoulos","year":"2009","unstructured":"Papadopoulos, S., Yang, Y., Bakiras, S., Papadias, D.: Continuous Spatial Authentication. In: Mamoulis, N., Seidl, T., Pedersen, T.B., Torp, K., Assent, I. (eds.) SSTD 2009. LNCS, vol.\u00a05644, pp. 62\u201379. Springer, Heidelberg (2009)"},{"key":"12_CR13","unstructured":"Papadopoulos, S., Yang, Y., Papadias, D.: CADS: Continuous Authentication on Data Streams. In: VLDB, pp. 135\u2013146 (2007)"},{"key":"12_CR14","unstructured":"R-tree Portal, \n                    \n                      http:\/\/www.rtreeportal.org\/"},{"key":"12_CR15","unstructured":"Sharifzadeh, M., Shahabi, C.: The Spatial Skyline Queries. In: Proc. VLDB (2006)"},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","volume":"18","author":"Y. Yang","year":"2009","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated Indexing for Outsourced Spatial Databases. VLDB Journal\u00a018(3), 631\u2013648 (2009)","journal-title":"VLDB Journal"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated Join Processing in Outsourced Databases. In: SIGMOD (2009)","DOI":"10.1145\/1559845.1559849"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Lin, Y., Mouratidis, K.: Efficient Verification of Shortest Path Search via Authenticated Hints. In: ICDE, pp. 237\u2013248 (2010)","DOI":"10.1109\/ICDE.2010.5447914"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Lo, E., Yung, D.: Authentication of Moving kNN Queries. In: ICDE (2011)","DOI":"10.1109\/ICDE.2011.5767829"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, B., Lee, C.K., Lee, W.-C.: Location-Dependent Skyline Query. In: Proc. Int\u2019l. Conf. Mobile Data Management (2008)","DOI":"10.1109\/MDM.2008.14"}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32281-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:01:08Z","timestamp":1558314068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32281-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642322808","9783642322815"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32281-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}