{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:38:48Z","timestamp":1742391528931,"version":"3.33.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2007,9,22]],"date-time":"2007-09-22T00:00:00Z","timestamp":1190419200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1007\/s00778-007-0069-7","type":"journal-article","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T13:58:30Z","timestamp":1190383110000},"page":"225-242","source":"Crossref","is-referenced-by-count":4,"title":["Trustworthy keyword search for compliance storage"],"prefix":"10.1007","volume":"17","author":[{"given":"Soumyadeb","family":"Mitra","sequence":"first","affiliation":[]},{"given":"Marianne","family":"Winslett","sequence":"additional","affiliation":[]},{"given":"Windsor W.","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Kevin Chen-Chuan","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,9,22]]},"reference":[{"key":"69_CR1","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/s007780050028","volume":"5","author":"B. Becker","year":"1996","unstructured":"Becker B., Gschwind S., Ohler T., Seeger B. and Widmayer P. (1996). An asymptotically optimal multiversion B-tree. Very Large Data Bases J. 5: 264\u2013275","journal-title":"Very Large Data Bases J."},{"doi-asserted-by":"crossref","unstructured":"libech, K., Gabillon, A.: Chronos: an authenticated dictionary based on skip lists for timestamping systems. In: Workshop on Secure Web Services, pp. 84\u201390 (2005)","key":"69_CR2","DOI":"10.1145\/1103022.1103037"},{"unstructured":"Brown, E., Callan, J., oft, W.: Fast inemental indexing for full-text information retrieval. In: Very Large Data Bases (VLDB) (1994)","key":"69_CR3"},{"doi-asserted-by":"crossref","unstructured":"Brown, E.W., Callan, J.P., Croft, W.B., Moss, J.E.B.: Supporting full-text information retrieval with a persistent object store. In: Extending Database Technology (EDBT) (1994)","key":"69_CR4","DOI":"10.1007\/3-540-57818-8_64"},{"unstructured":"Congress of the United States of America. Sarbanes-Oxley Act, 2002. Available at http:\/\/thomas.loc.gov","key":"69_CR5"},{"unstructured":"Crescenzi, P., Kann, V.: A compendium of NP optimization problems. http:\/\/www.nada.kth.se\/viggo\/problemlist","key":"69_CR6"},{"doi-asserted-by":"crossref","unstructured":"Cutting, D., Pedersen, J.: Optimization for dynamic inverted index maintenance. In: ACM Special Interest Group on Information Retrieval (SIGIR) (1990)","key":"69_CR7","DOI":"10.1145\/96749.98245"},{"doi-asserted-by":"crossref","unstructured":"Easton, M.C.: Key-sequence data sets on indelible storage. IBM J. Res. Develop. (1986) (in press)","key":"69_CR8","DOI":"10.1147\/rd.303.0230"},{"unstructured":"EMC Corp. EMC Centera Content Addressed Storage System, 2003. Available at http:\/\/www.emc.com\/products\/systems\/centera_ce.jsp","key":"69_CR9"},{"key":"69_CR10","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/4078.4080","volume":"17","author":"C. Faloutsos","year":"1985","unstructured":"Faloutsos C. (1985). Access methods for text. ACM Comput. Surv. 17: 49\u201374","journal-title":"ACM Comput. Surv."},{"unstructured":"Faloutsos, C., Jagadish, H.V.: On B-tree indices for skewed distributions. In: Very Large Data Bases (VLDB) (1992)","key":"69_CR11"},{"doi-asserted-by":"crossref","unstructured":"Fontoura, M.F., Neumann, A., Rajagopalan, S., Shekita, E., Zien, J.: High performance index build algorithms for intranet search engines. In: Very Large Data Bases (VLDB) (2004)","key":"69_CR12","DOI":"10.1016\/B978-012088469-8.50101-7"},{"unstructured":"Goh, E., Shacham, H., Modadugu, N., Boneh, D.: Sirius: Securing remote untrusted storage. In: Network and Distributed System Security Symposium (NDSS) (2003)","key":"69_CR13"},{"unstructured":"Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DARPA Information Survivability Conference and Exposition (DISCEX) II (2001)","key":"69_CR14"},{"key":"69_CR15","volume-title":"Database Systems, A Complete Book","author":"J.W.H. Garcia-Molina","year":"2000","unstructured":"Garcia-Molina J.W.H. and Ullman J.D. (2000). Database Systems, A Complete Book. Prentice-Hall, New Jersely"},{"doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: International Conference on Data Engineering (ICDE) (2002)","key":"69_CR16","DOI":"10.1109\/ICDE.2002.994695"},{"doi-asserted-by":"crossref","unstructured":"Heinz, S., Zobel, J.: Efficient single-pass index construction for text databases. In: Journal of the American Society for Information Science and Technology (JASIST) (2003)","key":"69_CR17","DOI":"10.1002\/asi.10268"},{"doi-asserted-by":"crossref","unstructured":"Hirai, J., Raghavan, S., Garcia-Molina, H., Paepcke, A.: Webbase: a repository of web pages. In: The International Journal of Computer and Telecommunications Networking, pp. 277\u2013293 (2000)","key":"69_CR18","DOI":"10.1016\/S1389-1286(00)00063-3"},{"unstructured":"Huang, L., Hsu, W., Zheng, F.: Content immutable storage for trustworthy record keeping. In: NASA Conference on Mass Storage Systems and Technologies (MSST) (2006)","key":"69_CR19"},{"unstructured":"IBM Corp. IBM TotalStorage DR550, 2004. Available at http:\/\/www-1.ibm.com\/servers\/storage\/disk\/dr","key":"69_CR20"},{"unstructured":"Klimt, B., Yang, Y.: Introducing the Enron Corpus. In: Conference on Email and Anti-Spam (CEAS) (2004)","key":"69_CR21"},{"unstructured":"Lester, N., Zobel, J., Williams, H.E.: In-place versus re-build versus re-merge: index maintenance strategies for text retrieval systems. In: Conference on Australasian Computer Science (2004)","key":"69_CR22"},{"unstructured":"Miller, E.L., Freeman, W.E., Long, D.D.E., Reed, B.C.: Strong security for network-attached storage. In: USENIX Conference on File and Storage Technologies (FAST) (2002)","key":"69_CR23"},{"unstructured":"Network Appliance, Inc. SnapLockTM Compliance and SnapLock Enterprise Software, 2003. Available at http:\/\/www.netapp.com\/products\/filer\/snaplock.html","key":"69_CR24"},{"doi-asserted-by":"crossref","unstructured":"Rathmann, P.: Dynamic data structures on optical disks. In: International Conference on Data Engineering (ICDE) (1984)","key":"69_CR25","DOI":"10.1109\/ICDE.1984.7271270"},{"doi-asserted-by":"crossref","unstructured":"Robertson, S.E., Walker, S., Hancock-Beaulieu, M., Gull, A., Lau, M.: Okapi at TREC. In: Text Retrieval Conference (TREC) (1992)","key":"69_CR26","DOI":"10.6028\/NIST.SP.500-215.city"},{"unstructured":"Securities and Exchange Commission. Guidance to Broker- Dealers on the Use of Electronic Storage Media under the National Commerce Act of 2000 with Respect to Rule 17a-4(f), 2001. Available at http:\/\/www.sec.gov\/rules\/interp\/34-44238.htm","key":"69_CR27"},{"unstructured":"Krijnen, T., Meertens, L.G.L.T.: Making B-Trees Work for B.IW 219\/83. The Mathematical Centre, Amsterdam, The Netherlands (1983)","key":"69_CR28"},{"unstructured":"The Enterprise Storage Group, Inc. Compliance.: the effect on information management and the storage industry, May 2003. Available at http:\/\/www.enterprisestoragegroup.com","key":"69_CR29"},{"doi-asserted-by":"crossref","unstructured":"Tomasic, A., Garc\u00eda-Molina, H., Shoens, K.: Inemental updates of inverted lists for text document retrieval. In: Very Large Data Bases (VLDB) (1994)","key":"69_CR30","DOI":"10.1145\/191839.191896"},{"unstructured":"United States Department of Health and Human Services. Health Insurance Portability and Accountability Act of 1996. Available at http:\/\/www.hhs.gov\/o\/hipaa\/","key":"69_CR31"},{"unstructured":"Wittenm, I.H., Moffat, A., Bell, T.C.: Managing Gigabytes: Compressing and Indexing Documents and Images. Morgan Kaufman, San Francisco (1999)","key":"69_CR32"},{"doi-asserted-by":"crossref","unstructured":"Zhu, Q., Hsu, W.: Fossilized index: the linchpin of trustworthy non-alterable electronic records. In: ACM SIGMOD International Conference on Management of Data (2005)","key":"69_CR33","DOI":"10.1145\/1066157.1066203"},{"key":"69_CR34","volume-title":"Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology","author":"G.K. Zipf","year":"1949","unstructured":"Zipf G.K. (1949). Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology. Addison-Wesley, Cambridge"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-007-0069-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-007-0069-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-007-0069-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T04:15:22Z","timestamp":1737432922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-007-0069-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,22]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["69"],"URL":"https:\/\/doi.org\/10.1007\/s00778-007-0069-7","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"type":"print","value":"1066-8888"},{"type":"electronic","value":"0949-877X"}],"subject":[],"published":{"date-parts":[[2007,9,22]]}}}