{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:20:54Z","timestamp":1745382054343,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642353611"},{"type":"electronic","value":"9783642353628"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35362-8_15","type":"book-chapter","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T03:55:47Z","timestamp":1354247747000},"page":"179-193","source":"Crossref","is-referenced-by-count":17,"title":["Supporting Security and Consistency for Cloud Database"],"prefix":"10.1007","author":[{"given":"Luca","family":"Ferretti","sequence":"first","affiliation":[]},{"given":"Michele","family":"Colajanni","sequence":"additional","affiliation":[]},{"given":"Mirco","family":"Marchetti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"15_CR1","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M. Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: A view of cloud computing. Communications of the ACM\u00a053(4), 50\u201358 (2010)","journal-title":"Communications of the ACM"},{"issue":"2","key":"15_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/568271.223785","volume":"24","author":"H. Berenson","year":"1995","unstructured":"Berenson, H., Bernstein, P., Gray, J., Melton, J., O\u2019Neil, E., O\u2019Neil, P.: A critique of ansi sql isolation levels. SIGMOD Rec.\u00a024(2), 1\u201310 (1995)","journal-title":"SIGMOD Rec."},{"key":"15_CR3","first-page":"199","volume-title":"Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference","author":"G. Cattaneo","year":"2001","unstructured":"Cattaneo, G., Catuogno, L., Sorbo, A.D., Persiano, P.: The design and implementation of a transparent cryptographic file system for unix. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp. 199\u2013212. USENIX Association, Berkeley (2001)"},{"key":"15_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/11552338_2","volume-title":"Secure Data Management","author":"E. Damiani","year":"2005","unstructured":"Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Metadata Management in Outsourced Encrypted Databases. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2005. LNCS, vol.\u00a03674, pp. 16\u201332. Springer, Heidelberg (2005)"},{"key":"15_CR5","first-page":"93","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003","author":"E. Damiani","year":"2003","unstructured":"Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational dbmss. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, pp. 93\u2013102. ACM, New York (2003)"},{"key":"15_CR6","unstructured":"Feldman, A., Zeller, W., Freedman, M., Felten, E.: Sporc: Group collaboration using untrusted cloud resources. OSDI (October 2010)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, pp. 29\u201338 (2002)","DOI":"10.1109\/ICDE.2002.994695"},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1145\/564691.564717","volume-title":"Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002","author":"H. Hacig\u00fcm\u00fc\u015f","year":"2002","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, pp. 216\u2013227. ACM, New York (2002)"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T.: Guidelines on security and privacy in public cloud computing. NIST Special Publication 800\u2013144(2011)","DOI":"10.6028\/NIST.SP.800-144"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Li, J., Krohn, M., Mazi\u00e8res, D., Shasha, D.: Secure untrusted data repository (sundr). In: Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pp. 91\u2013106 (2004)","DOI":"10.21236\/ADA445862"},{"issue":"4","key":"15_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2063509.2063512","volume":"29","author":"P. Mahajan","year":"2011","unstructured":"Mahajan, P., Setty, S., Lee, S., Clement, A., Alvisi, L., Dahlin, M., Walfish, M.: Depot: Cloud storage with minimal trust. ACM Trans. Comput. Syst.\u00a029(4), 12:1\u201312:38 (2011)","journal-title":"ACM Trans. Comput. Syst."},{"key":"15_CR12","unstructured":"Oracle corporation: Oracle advanced security (October 2012), http:\/\/www.oracle.com\/technetwork\/database\/options\/advanced-security"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2043556.2043566","volume-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011","author":"R.A. Popa","year":"2011","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 2011, pp. 85\u2013100. ACM, New York (2011)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Yabandeh, M., G\u00f3mez Ferro, D.: A critique of snapshot isolation. In: Proceedings of the 7th ACM European Conference on Computer Systems, pp. 155\u2013168. ACM (2012)","DOI":"10.1145\/2168836.2168853"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35362-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T00:18:21Z","timestamp":1745367501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35362-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642353611","9783642353628"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35362-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}