{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:45Z","timestamp":1725725445131},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_52","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"491-500","source":"Crossref","is-referenced-by-count":5,"title":["Policy-Based Customized Privacy Preserving Mechanism for SaaS Applications"],"prefix":"10.1007","author":[{"given":"Yuliang","family":"Shi","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, G., Wu, J.: An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, vol.\u00a002, pp. 715\u2013720 (2009)","DOI":"10.1109\/CSE.2009.66"},{"key":"52_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-642-13869-0_30","volume-title":"Trust and Trustworthy Computing","author":"A.-R. Sadeghi","year":"2010","unstructured":"Sadeghi, A.-R., Schneider, T., Winandy, M.: Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol.\u00a06101, pp. 417\u2013429. Springer, Heidelberg (2010)"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp. 136\u2013149 (2010)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"52_CR4","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-642-22709-7_47","volume-title":"Advances in Computing and Communications","author":"S. Ananthi","year":"2011","unstructured":"Ananthi, S., Sendil, M.S., Karthik, S.: Privacy preserving keyword search over encrypted cloud data. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds.) ACC 2011, Part I. CCIS, vol.\u00a0190, pp. 480\u2013487. Springer, Heidelberg (2011)"},{"key":"52_CR5","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J., Ren, C., Choi, B.: Processing Private Queries over Untrusted Data Cloud through Privacy Homomorphism. In: Proc. the 27th IEEE International Conference on Data Engineering, ICDE 2011 (2011)","DOI":"10.1109\/ICDE.2011.5767862"},{"key":"52_CR6","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: 2011 Proceedings IEEE INFOCOM, pp. 829\u2013837 (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"issue":"2","key":"52_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"52_CR8","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"52_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"S. Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 264\u2013282. Springer, Heidelberg (2005)"},{"key":"52_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"N.P. Smart","year":"2010","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 420\u2013443. Springer, Heidelberg (2010)"},{"key":"52_CR11","doi-asserted-by":"crossref","unstructured":"Munt\u00e9s-Mulero, V., Nin, J.: Privacy and anonymization for very large datasets. In: Proceedings of the 18th ACM Conference on Information and Knowledge Management, pp. 2117\u20132118 (2009)","DOI":"10.1145\/1645953.1646333"},{"issue":"7","key":"52_CR12","first-page":"1217","volume":"46","author":"L. YuBao","year":"2009","unstructured":"YuBao, L., Zhilan, H., Jian, Y., Weic, F.: Harm decomposition- based data privacy protection method. Journal of Integrative Plant Biology\u00a046(7), 1217\u20131225 (2009)","journal-title":"Journal of Integrative Plant Biology"},{"issue":"4","key":"52_CR13","first-page":"574","volume":"31","author":"Y. Xiaochun","year":"2008","unstructured":"Xiaochun, Y., Yazhe, W., Bin, W.: Multi-sensitive faced privacy protection method. Chinese Journal of Computers\u00a031(4), 574\u2013587 (2008)","journal-title":"Chinese Journal of Computers"},{"key":"52_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-23971-7_47","volume-title":"Web Information Systems and Mining","author":"K. Zhang","year":"2011","unstructured":"Zhang, K., Li, Q., Shi, Y.: Data privacy preservation during schema evolution for multi-tenancy applications in cloud computing. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds.) WISM 2011, Part I. LNCS, vol.\u00a06987, pp. 376\u2013383. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T21:31:03Z","timestamp":1557696663000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_52","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}