{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T02:43:28Z","timestamp":1747104208831,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":86,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662493007"},{"type":"electronic","value":"9783662493014"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-49301-4_15","type":"book-chapter","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T11:15:43Z","timestamp":1458299743000},"page":"205-239","source":"Crossref","is-referenced-by-count":15,"title":["Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud"],"prefix":"10.1007","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Livraga","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,18]]},"reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kierman, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceeding of SIGMOD 2004, Paris (2004)","DOI":"10.1145\/1007568.1007632"},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S Akl","year":"1983","unstructured":"Akl, S., Taylor, P.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1(3), 239\u2013248 (1983)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"18:1","DOI":"10.1145\/1455526.1455531","volume":"12","author":"M Atallah","year":"2009","unstructured":"Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and efficient key management for access hierarchies. ACM TISSEC 12(3), 18:1\u201318:43 (2009)","journal-title":"ACM TISSEC"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceeding of CCS 2007 (2007)","DOI":"10.1145\/1315245.1315318"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Barni, M., Bianchi, T., Catalano, D., Raimondo, M.D., Labati, R.D., Failla, P., Fiore, D., Lazzeretti, R., Piuri, V., Scotti, F., Piva, A.: A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: Proceeding of BTAS 2010, Washington, D.C (2010)","DOI":"10.1109\/BTAS.2010.5634527"},{"key":"15_CR6","first-page":"416","volume-title":"Lecture Notes in Computer Science","author":"Dan Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceeding of EUROCRYpPT 2003, Warsaw, May 2003"},{"issue":"2","key":"15_CR7","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831\u2013871 (2014)","journal-title":"SIAM J. Comput."},{"key":"15_CR8","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"Christian Cachin","year":"1999","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Proceeding of EUROCRYpPT 1999. Prague, May 1999"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-540-74835-9_12","volume-title":"Computer Security \u2013 ESORICS 2007","author":"V Ciriani","year":"2007","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragmentation and encryption to enforce privacy in data storage. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 171\u2013186. Springer, Heidelberg (2007)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-04444-1_27","volume-title":"Computer Security \u2013 ESORICS 2009","author":"V Ciriani","year":"2009","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Keep a few: outsourcing data while maintaining confidentiality. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 440\u2013455. Springer, Heidelberg (2009)"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"22:1","DOI":"10.1145\/1805974.1805978","volume":"13","author":"V Ciriani","year":"2010","unstructured":"Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Combining fragmentation and encryption to protect privacy in data storage. ACM TISSEC 13(3), 22:1\u201322:3 (2010)","journal-title":"ACM TISSEC"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-642-22792-9_28","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J-S Coron","year":"2011","unstructured":"Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully homomorphic encryption over the integers with shorter public keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487\u2013504. Springer, Heidelberg (2011)"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Coron, J.S., Naccache, D., Tibouchi, M.: Public key compression and modulus switching for fully homomorphic encryption over the integers. In: Proceeding of EUROCRYPT 2012, Cambridge, April 2012","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data encryption in outsourced dynamic environments. In: Proceeding of VODCA 2006, Bertinoro, September 2006","DOI":"10.1016\/j.entcs.2006.11.003"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proceeding of ACM CCS 2003, Washington, DC, October 2003","DOI":"10.1145\/948109.948124"},{"key":"15_CR16","unstructured":"Damiani, E., De Capitani di Vimercati, S., Samarati, P.: New paradigms for access control in open environments. In: Proceeding of ISSPPI 2005, Athens, December 2005"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Enforcing dynamic write privileges in data outsourcing. Computers & Security, November 2013","DOI":"10.1016\/j.cose.2013.01.008"},{"issue":"6","key":"15_CR18","first-page":"510","volume":"11","author":"S Capitani di Vimercati De","year":"2014","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Fragmentation in presence of data dependencies. IEEE TDSC 11(6), 510\u2013523 (2014)","journal-title":"IEEE TDSC"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., Samarati, P.: Integrity for distributed queries. In: Proceeding of CNS 2014, San Francisco, October 2014","DOI":"10.1109\/CNS.2014.6997505"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Pelosi, G., Samarati, P.: Preserving confidentiality of security policies in data outsourcing. In: Proceeding of WPES 2008, Alexandria, October 2008","DOI":"10.1145\/1456403.1456417"},{"issue":"2","key":"15_CR21","first-page":"12:1","volume":"35","author":"S Capitani di Vimercati De","year":"2010","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM TODS 35(2), 12:1\u201312:46 (2010)","journal-title":"ACM TODS"},{"issue":"2","key":"15_CR22","first-page":"187","volume":"1","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Integrity for join queries in the cloud. IEEE TCC 1(2), 187\u2013200 (2013)","journal-title":"IEEE TCC"},{"key":"15_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/978-3-662-43936-4_3","volume-title":"Data and Applications Security and Privacy XXVIII","author":"S Capitani di Vimercati De","year":"2014","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Optimizing integrity checks for join queries in the cloud. In: Atluri, V., Pernul, G. (eds.) DBSec 2014. LNCS, vol. 8566, pp. 33\u201348. Springer, Heidelberg (2014)"},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-0-387-27696-0_2","volume-title":"Secure Data Management in Decentralized Systems","author":"S Capitani di Vimercati De","year":"2007","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Samarati, P.: Access control policies and languages in open environments. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems, pp. 21\u201358. Springer, New York (2007)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proceeding of ICDCS 2011, Minneapolis, June 2011","DOI":"10.1109\/ICDCS.2011.37"},{"key":"15_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1007\/978-3-642-40203-6_35","volume-title":"Computer Security \u2013 ESORICS 2013","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Distributed shuffling for preserving access confidentiality. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 628\u2013645. Springer, Heidelberg (2013)"},{"issue":"3","key":"15_CR27","doi-asserted-by":"publisher","first-page":"425","DOI":"10.3233\/JCS-130468","volume":"21","author":"S Capitani di Vimercati De","year":"2013","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Supporting concurrency and multiple indexes in private access to outsourced data. JCS 21(3), 425\u2013461 (2013)","journal-title":"JCS"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Protecting access confidentiality with data distribution and swapping. In: Proceeding of BDCloud 2014, Sydney, December 2014","DOI":"10.1109\/BDCloud.2014.59"},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Samarati, P.: Managing and accessing data in the cloud: privacy risks and approaches. In: Proceeding of CRiSIS 2012, Cork, October 2012","DOI":"10.1109\/CRISIS.2012.6378956"},{"key":"15_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-31970-2_18","volume-title":"Databases in Networked Information Systems","author":"S Capitani di Vimercati De","year":"2005","unstructured":"De Capitani di Vimercati, S., Samarati, P., Jajodia, S.: Policies, models, and languages for access control. In: Bhalla, S. (ed.) DNIS 2005. LNCS, vol. 3433, pp. 225\u2013237. Springer, Heidelberg (2005)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Delerue Arriaga, A., Tang, Q., Ryan, P.: Trapdoor privacy in asymmetric searchable encryption schemes. In: Proceeding of AFRICACRYPT 2014, Marrakesh, May 2014","DOI":"10.1007\/978-3-319-06734-6_3"},{"key":"15_CR32","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Proceeding of DBSec 2000, Schoorl, August 2000"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Di Battista, G., Palazzi, B.: Authenticated relational tables and authenticated skip lists. In: Proceding of DBSec 2007, Redondo Beach, July 2007","DOI":"10.1007\/978-3-540-73538-0_3"},{"issue":"1","key":"15_CR34","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1109\/TIFS.2010.2101062","volume":"6","author":"X Ding","year":"2011","unstructured":"Ding, X., Yang, Y., Deng, R.: Database access pattern protection without full-shuffles. IEEE Trans. Inf. Forensics Secur. 6(1), 189\u2013201 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-642-21031-0_7","volume-title":"Information Security Practice and Experience","author":"F Zhao","year":"2011","unstructured":"Zhao, F., Nishide, T., Sakurai, K.: Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 83\u201397. Springer, Heidelberg (2011)"},{"key":"15_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7659-8","volume-title":"Preserving Privacy in Data Outsourcing","author":"S Foresti","year":"2011","unstructured":"Foresti, S.: Preserving Privacy in Data Outsourcing. Springer, New York (2011)"},{"key":"15_CR37","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proceeding of RoboCare Workshop 2005, Rome, May 2005"},{"key":"15_CR38","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceeding of STOC 2009, Bethesda, May 2009","DOI":"10.1145\/1536414.1536440"},{"key":"15_CR39","unstructured":"Goh, E.J.: Secure indexes. Technical report. 2003\/216, Cryptology ePrint Archive (2003)"},{"issue":"3","key":"15_CR40","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious RAMs. J. ACM 43(3), 431\u2013473 (1996)","journal-title":"J. ACM"},{"key":"15_CR41","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Practical oblivious storage. In: Proceeding of CODASPY 2012, San Antonio, February 2012","DOI":"10.1145\/2133601.2133604"},{"key":"15_CR42","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-preserving group data access via stateless oblivious RAM simulation. In: Proceeding of SODA 2012, Kyoto, January 2012","DOI":"10.1137\/1.9781611973099.14"},{"key":"15_CR43","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceeding of ACM CCS, Alexandria (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"15_CR44","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Ensuring integrity of encrypted databases in database as a service model. In: Proceeding of DBSec 2003, Estes Park, August 2003","DOI":"10.1007\/1-4020-8070-0_5"},{"key":"15_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","volume-title":"Database Systems for Advanced Applications","author":"H Hac\u0131g\u00fcm\u00fc\u015f","year":"2004","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y.J., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol. 2973, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"15_CR46","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proceeding of SIGMOD 2002, Madison, June 2002","DOI":"10.1145\/564716.564717"},{"key":"15_CR47","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. In: Proceeding of CSE 2012, Paphos, December 2012","DOI":"10.1109\/ICCSE.2012.32"},{"key":"15_CR48","doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V., Santambrogio, M.: A comprehensive conceptual system-level approach to fault tolerance in cloud computing. In: Proceeding of SysCon 2012, Vancouver, March 2012","DOI":"10.1109\/SysCon.2012.6189503"},{"issue":"2","key":"15_CR49","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1109\/JSYST.2012.2221934","volume":"7","author":"R Jhawar","year":"2013","unstructured":"Jhawar, R., Piuri, V., Santambrogio, M.: Fault tolerance management in cloud computing: a system-level perspective. IEEE Syst. J. 7(2), 288\u2013297 (2013)","journal-title":"IEEE Syst. J."},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Juels, A., Kaliski Jr., B.S.: PORs: proofs of retrievability for large files. In: Proc. of ACM CCS, Alexandria (2007)","DOI":"10.1145\/1315245.1315317"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceeding of SIGMOD 2006, Chicago, June 2006","DOI":"10.1145\/1142473.1142488"},{"key":"15_CR52","doi-asserted-by":"crossref","unstructured":"Lin, P., Candan, K.: Hiding traversal of tree structured data from untrusted data stores. In: Proceeding of WOSIS 2004, Porto, April 2004","DOI":"10.1007\/3-540-44853-5_35"},{"key":"15_CR53","doi-asserted-by":"crossref","unstructured":"Liu, R., Wang, H.: Integrity verification of outsourced XML databases. In: Proceeding of CSE 2009, Vancouver, August 2009","DOI":"10.1109\/CSE.2009.175"},{"key":"15_CR54","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"RC Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"issue":"2","key":"15_CR55","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM TOS 2(2), 107\u2013138 (2006)","journal-title":"ACM TOS"},{"key":"15_CR56","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Skeith III., W.E.: A survey of single-database private information retrieval: techniques and applications. In: Proceeding of PKC 2007, Beijing, April 2007","DOI":"10.1007\/978-3-540-71677-8_26"},{"key":"15_CR57","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: Proceeding of SIGMOD 2005, Baltimore, June 2005","DOI":"10.1145\/1066157.1066204"},{"key":"15_CR58","unstructured":"Pang, H., Tan, K.: Authenticating query results in edge computing. In: Proceeding of ICDE 2004, Boston, April 2004"},{"issue":"7","key":"15_CR59","first-page":"1533","volume":"25","author":"H Pang","year":"2013","unstructured":"Pang, H., Zhang, J., Mouratidis, K.: Enhancing access privacy of range retrievals over \n                      \n                        \n                      \n                      $$B+$$\n                    -trees. IEEE TKDE 25(7), 1533\u20131547 (2013)","journal-title":"IEEE TKDE"},{"key":"15_CR60","doi-asserted-by":"crossref","unstructured":"Popa, R., Redfield, C., Zeldovich, N., Balakrishnan, H.: CryptDB: Protecting confidentiality with encrypted query processing. In: Proceeding of SOSP 2011, Cascais, October 2011","DOI":"10.1145\/2043556.2043566"},{"key":"15_CR61","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: DeMillo, R., Lipton, R., Jones, A. (eds.) Foundation of Secure Computations. Academic Press (1978)"},{"key":"15_CR62","doi-asserted-by":"crossref","unstructured":"Ruj, S., Stojmenovic, M., Nayak, A.: Privacy preserving access control with authentication for securing data in clouds. In: Proceeding of CCGrid 2012, Ottawa, May 2012","DOI":"10.1109\/CCGrid.2012.92"},{"key":"15_CR63","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-319-06320-1_4","volume-title":"Information Security Practice and Experience","author":"P Samarati","year":"2014","unstructured":"Samarati, P.: Data security and privacy in the cloud. In: Huang, X., Zhou, J. (eds.) ISPEC 2014. LNCS, vol. 8434, pp. 28\u201341. Springer, Heidelberg (2014)"},{"key":"15_CR64","doi-asserted-by":"crossref","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Data protection in outsourcing scenarios: Issues and directions. In: Proceeding of ASIACCS 2010, Beijing, April 2010","DOI":"10.1145\/1755688.1755690"},{"key":"15_CR65","doi-asserted-by":"crossref","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Cloud security: Issues and concerns. In: Murugesan, S., Bojanova, I. (eds.) Encyclopedia on Cloud Computing. Wiley (2015)","DOI":"10.1002\/9781118821930.ch17"},{"key":"15_CR66","unstructured":"Sandhu, R.: On some cryptographic solutions for access control in a tree hierarchy. In: Proceeding of the 1987 Fall Joint Computer Conference on Exploring Technology: Today and Tomorrow, Dallas, October 1987"},{"issue":"2","key":"15_CR67","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0190(88)90099-3","volume":"27","author":"R Sandhu","year":"1988","unstructured":"Sandhu, R.: Cryptographic implementation of a tree hierarchy for access control. Inf. Process. Lett. 27(2), 95\u201398 (1988)","journal-title":"Inf. Process. Lett."},{"key":"15_CR68","doi-asserted-by":"crossref","unstructured":"Shacham, H., Waters, B.: Compact proofs of retrievability. In: Proceeding of ASIACRYPT 2008, Melbourne, December 2008","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"15_CR69","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceeding of IEEE S&P 2000, Berkeley, May 2000"},{"key":"15_CR70","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceeding of ACM CCS 2013, Berlin, November 2013","DOI":"10.1145\/2508859.2516660"},{"key":"15_CR71","doi-asserted-by":"crossref","unstructured":"Stefanov, E., Shi, E.: ObliviStore: high performance oblivious cloud storage. In: Proceeding of IEEE S&P 2013, Berkeley, May 2013","DOI":"10.1109\/SP.2013.25"},{"issue":"2","key":"15_CR72","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1109\/TIFS.2011.2172209","volume":"7","author":"Z Wan","year":"2012","unstructured":"Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743\u2013754 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"15_CR73","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Trans. Parallel Distrib. Syst. 23(8), 1467\u20131479 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"15_CR74","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2013","unstructured":"Wang, C., Chow, S.S., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362\u2013375 (2013)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR75","unstructured":"Wang, H., Lakshmanan, L.: Efficient secure query evaluation over encrypted XML databases. In: Proceeding of VLDB 2006, Seoul, September 2006"},{"key":"15_CR76","doi-asserted-by":"crossref","unstructured":"Wang, H., Yin, J., Perng, C., Yu, P.: Dual encryption for query integrity assurance. In: Proceeding of CIKM 2008, Napa Valley, October 2008","DOI":"10.1145\/1458082.1458196"},{"key":"15_CR77","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-19379-8_4","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"Brent Waters","year":"2011","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceeding of PKC 2011, Taormina, March 2011"},{"key":"15_CR78","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R.: Single round access privacy on outsourced storage. In: Proceeding of ACM CCS 2012, Raleigh, October 2012","DOI":"10.1145\/2382196.2382229"},{"key":"15_CR79","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proceeding of ACM CCS 2008, Alexandria, October 2008","DOI":"10.1145\/1455770.1455790"},{"key":"15_CR80","doi-asserted-by":"crossref","unstructured":"Williams, P., Sion, R., Tomescu, A.: PrivateFS: A parallel oblivious file system. In: Proceeding of ACM CCS 2012, Raleigh, October 2012","DOI":"10.1145\/2382196.2382299"},{"key":"15_CR81","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceeding of VLDB 2007, Vienna, September 2007"},{"key":"15_CR82","doi-asserted-by":"crossref","unstructured":"Yang, K., Jia, X., Ren, K.: Attribute-based fine-grained access control with efficient revocation in cloud storage systems. In: Proceeding of ASIACCS 2013, Hangzhou, May 2013","DOI":"10.1145\/2484313.2484383"},{"key":"15_CR83","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/978-3-642-23822-2_29","volume-title":"Computer Security \u2013 ESORICS 2011","author":"K Yang","year":"2011","unstructured":"Yang, K., Zhang, J., Zhang, W., Qiao, D.: A light-weight solution to preservation of access pattern privacy in un-trusted clouds. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 528\u2013547. Springer, Heidelberg (2011)"},{"key":"15_CR84","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: Proceeding of SIGMOD, Providence (2009)","DOI":"10.1145\/1559845.1559849"},{"key":"15_CR85","doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceeding of INFOCOM 2010, San Diego, March 2010","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"2","key":"15_CR86","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TSC.2011.51","volume":"6","author":"Y Zhu","year":"2013","unstructured":"Zhu, Y., Ahn, G.J., Hu, H., Yau, S., An, H., Hu, C.J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227\u2013238 (2013)","journal-title":"IEEE Trans. Serv. Comput."}],"container-title":["Lecture Notes in Computer Science","The New Codebreakers"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49301-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:53:08Z","timestamp":1559400788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49301-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662493007","9783662493014"],"references-count":86,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49301-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}