{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T20:34:47Z","timestamp":1773434087372,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2008,9,23]],"date-time":"2008-09-23T00:00:00Z","timestamp":1222128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1007\/s00778-008-0113-2","type":"journal-article","created":{"date-parts":[[2008,9,22]],"date-time":"2008-09-22T16:29:21Z","timestamp":1222100961000},"page":"631-648","source":"Crossref","is-referenced-by-count":101,"title":["Authenticated indexing for outsourced spatial databases"],"prefix":"10.1007","volume":"18","author":[{"given":"Yin","family":"Yang","sequence":"first","affiliation":[]},{"given":"Stavros","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Papadias","sequence":"additional","affiliation":[]},{"given":"George","family":"Kollios","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,9,23]]},"reference":[{"key":"113_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"issue":"3","key":"113_CR2","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s00454-002-2817-1","volume":"28","author":"P. Agrawal","year":"2002","unstructured":"Agrawal P., de Berg M., Gudmundsson J., Hammar M., Haverkroft H.: Box-trees and R-trees with near-optimal query time. Discret. Comput. Geom. 28(3), 291\u2013312 (2002)","journal-title":"Discret. Comput. Geom."},{"key":"113_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry: Algorithms and Applications","author":"M. Berg de","year":"1997","unstructured":"de Berg M., van Kreveld M., Overmars M., Schwarzkopf O.: Computational Geometry: Algorithms and Applications. Springer, Heidelberg (1997)"},{"key":"113_CR4","doi-asserted-by":"crossref","unstructured":"Beckmann, N., Kriegel, H.-P., Schneider, R., Seeger, B.: The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD (1990)","DOI":"10.1145\/93597.98741"},{"key":"113_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, W., Tan, K.-L.: Query assurance verification for outsourced multi-dimensional databases. J. Comput. Secur. (to appear)","DOI":"10.3233\/JCS-2009-0315"},{"key":"113_CR6","doi-asserted-by":"crossref","unstructured":"Cheng, W., Tan, K.-L.: Authenticating kNN query results in data publishing. Secure Data Management (2007)","DOI":"10.1007\/978-3-540-75248-6_4"},{"key":"113_CR7","doi-asserted-by":"crossref","unstructured":"Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. DBSEC (2006)","DOI":"10.1007\/11805588_5"},{"key":"113_CR8","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. VLDB (2007)"},{"key":"113_CR9","unstructured":"Crypto++ library.: www.eskimo.com\/~weidai\/benchmark.html"},{"issue":"3","key":"113_CR10","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu P., Gertz M., Martel C., Stubblebine S.: Authentic data publication over the internet. J. Comput. Secur. 11(3), 291\u2013314 (2003)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"113_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/310701.310710","volume":"24","author":"V. Datta","year":"1999","unstructured":"Datta V., Vandermeer D., Celik A., Kumar V.: Broadcast protocols to support efficient retrieval from databases by mobile users. ACM TODS. 24(1), 1\u201379 (1999)","journal-title":"ACM TODS."},{"key":"113_CR12","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. CCS (2003)","DOI":"10.1145\/948121.948124"},{"key":"113_CR13","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: A dynamic index structure for spatial searching. SIGMOD (1984)","DOI":"10.1145\/602259.602266"},{"key":"113_CR14","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. CT-RSA (2003)","DOI":"10.1007\/3-540-36563-X_20"},{"key":"113_CR15","unstructured":"Ge, T., Zdonik, S.: Answering aggregate queries in a secure system model. VLDB (2007)"},{"key":"113_CR16","unstructured":"Haber, S., Horne, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. HP Labs Tech-Report 2006-128 (2006)"},{"key":"113_CR17","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Providing databases as a service. ICDE (2002)"},{"key":"113_CR18","doi-asserted-by":"crossref","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the data-service-provider model. SIGMOD (2002)","DOI":"10.1145\/564691.564717"},{"issue":"2","key":"113_CR19","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1145\/320248.320255","volume":"24","author":"G. Hjaltason","year":"1999","unstructured":"Hjaltason G., Samet H.: Distance browsing in spatial databases. ACM TODS. 24(2), 265\u2013318 (1999)","journal-title":"ACM TODS."},{"key":"113_CR20","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"113_CR21","unstructured":"Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: enabling authentication of sliding window queries on streams. VLDB (2007)"},{"key":"113_CR22","unstructured":"Merkle, R.: A certified digital signature. CRYPTO (1989)"},{"issue":"1","key":"113_CR23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s00453-003-1076-8","volume":"39","author":"C. Martel","year":"2004","unstructured":"Martel C., Nuckolls G., Devanbu P., Gertz M., Kwong A., Stubblebine S.: A general model for authenticated data structures. Algorithmica 39(1), 21\u201341 (2004)","journal-title":"Algorithmica"},{"key":"113_CR24","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: immutability for aggregated\/condensed signatures. ESORICS (2004)","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"113_CR25","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A. Menezes","year":"1996","unstructured":"Menezes A., van Oorschot P., Vanstone S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"113_CR26","unstructured":"Naor, M., Nissim, K.: Certificate revocation and certificate update. USENIX (1998)"},{"key":"113_CR27","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. DASFAA (2006)","DOI":"10.1007\/11733836_30"},{"key":"113_CR28","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"113_CR29","doi-asserted-by":"crossref","unstructured":"Pagel, B., Six, H., Toben, H., Widmayer, P.: Towards an analysis of range query performance in spatial data structures. PODS (1993)","DOI":"10.1145\/153850.153878"},{"issue":"1","key":"113_CR30","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1061318.1061320","volume":"30","author":"D. Papadias","year":"2005","unstructured":"Papadias D., Tao Y., Fu G., Seeger B.: Progressive skyline computation in database systems. ACM TODS. 30(1), 41\u201382 (2005)","journal-title":"ACM TODS."},{"key":"113_CR31","unstructured":"Pang, H., Tan, K.-L.: Authenticating query results in edge computing. ICDE (2004)"},{"key":"113_CR32","unstructured":"Papadopoulos, S., Yang, Y., Papadias, D.: CADS: continuous authentication on data streams. VLDB (2007)"},{"key":"113_CR33","unstructured":"R-tree portal.: www.rtreeportal.org"},{"key":"113_CR34","unstructured":"Sion R.: Query execution assurance for outsourced databases. VLDB (2005)"},{"key":"113_CR35","unstructured":"Theodoridis, Y., Sellis, T.: A model for the prediction of R-tree performance. PODS (1999)"},{"key":"113_CR36","doi-asserted-by":"crossref","unstructured":"Tamassia, R., Triandopoulos, N.: Efficient content authentication in Peer-to-Peer networks. ACNS (2007)","DOI":"10.1007\/978-3-540-72738-5_23"},{"key":"113_CR37","unstructured":"Wong, W., Cheung, D., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. VLDB (2007)"},{"key":"113_CR38","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X. Integrity audit of outsourced data. VLDB (2007)"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-008-0113-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-008-0113-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-008-0113-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T15:05:04Z","timestamp":1559142304000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-008-0113-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,23]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,6]]}},"alternative-id":["113"],"URL":"https:\/\/doi.org\/10.1007\/s00778-008-0113-2","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,9,23]]}}}