{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:49:08Z","timestamp":1725796148386},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662439357"},{"type":"electronic","value":"9783662439364"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_3","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T08:05:04Z","timestamp":1403856304000},"page":"33-48","source":"Crossref","is-referenced-by-count":4,"title":["Optimizing Integrity Checks for Join Queries in the Cloud"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Paraboschi","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Basu, A., Vaidya, J., Kikuchi, H., Dimitrakos, T.: Privacy-preserving collaborative filtering on the cloud and practical implementation experiences. In: Proc. of IEEE Cloud, Santa Clara, CA (June-July 2013)","DOI":"10.1109\/CLOUD.2013.109"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of CCS, Washington, DC (October 2003)","DOI":"10.1145\/948121.948124"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1007\/978-3-642-31540-4_24","volume-title":"Data and Applications Security and Privacy XXVI","author":"S. Capitani di Vimercati De","year":"2012","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G.: Enforcing subscription-based authorization policies in cloud scenarios. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol.\u00a07371, pp. 314\u2013329. Springer, Heidelberg (2012)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS\u00a035(2), 12:1\u201312:46 (2010)","DOI":"10.1145\/1735886.1735891"},{"issue":"2","key":"3_CR5","first-page":"187","volume":"1","author":"S. Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE TCC\u00a01(2), 187\u2013200 (2013)","journal-title":"IEEE TCC"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: Privacy risks and approaches. In: Proc. of CRiSIS, Cork, Ireland (October 2012)","DOI":"10.1109\/CRISIS.2012.6378956"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of SIGMOD, Madison, WI (June 2002)","DOI":"10.1145\/564716.564717"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance and resilience in cloud computing environments. In: Vacca, J. (ed.) Computer and Information Security Handbook, 2nd edn., pp. 125\u2013142. Morgan Kaufmann (2013)","DOI":"10.1016\/B978-0-12-394397-2.00007-6"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Santambrogio, M.: Fault tolerance management in cloud computing: A system-level perspective. IEEE Systems Journal\u00a07(2), 288\u2013297 (2013)","DOI":"10.1109\/JSYST.2012.2221934"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Kossmann, D., Kraska, T., Loesing, S.: An evaluation of alternative architectures for transaction processing in the cloud. In: Proc. of SIGMOD, Indianapolis, IN (June 2010)","DOI":"10.1145\/1807167.1807231"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proc. of SIGMOD, Chicago, IL (June 2006)","DOI":"10.1145\/1142473.1142488"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Authenticated index structures for aggregation queries. ACM TISSEC\u00a013(4), 32:1\u201332:35 (2010)","DOI":"10.1145\/1880022.1880026"},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E. Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS\u00a02(2), 107\u2013138 (2006)","journal-title":"ACM TOS"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: Proc. of SIGMOD, Baltimore, MA (June 2005)","DOI":"10.1145\/1066157.1066204"},{"issue":"1","key":"3_CR15","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K. Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Computing\u00a016(1), 69\u201373 (2012)","journal-title":"IEEE Internet Computing"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proc. of CIKM, Napa Valley, CA (October 2008)","DOI":"10.1145\/1458082.1458196"},{"key":"3_CR17","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proc. of VLDB, Vienna, Austria (September 2007)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: Proc. of EDBT, Nantes, France (March 2008)","DOI":"10.1145\/1353343.1353384"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Z., Gao, S., Xu, J., Choi, B.: Authentication of range query results in MapReduce environments. In: Proc. of CloudDB, Glasgow, UK (October 2011)","DOI":"10.1145\/2064085.2064093"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T00:40:26Z","timestamp":1558917626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}