{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T11:48:56Z","timestamp":1674560936019},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T00:00:00Z","timestamp":1244246400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1007\/s00778-009-0145-2","type":"journal-article","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T18:48:07Z","timestamp":1244227687000},"page":"161-180","source":"Crossref","is-referenced-by-count":20,"title":["Continuous authentication on relational streams"],"prefix":"10.1007","volume":"19","author":[{"given":"Stavros","family":"Papadopoulos","sequence":"first","affiliation":[]},{"given":"Yin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Papadias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,6]]},"reference":[{"key":"145_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"145_CR2","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Cho, Y., Kundu, A.: Efficient data authentication in an environment of untrusted third-party distributors. ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497478"},{"key":"145_CR3","doi-asserted-by":"crossref","unstructured":"Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. SIGMOD (2003)","DOI":"10.1145\/872757.872822"},{"key":"145_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-03427-9","volume-title":"Computational Geometry: Algorithms and Applications","author":"M. Berg de","year":"1997","unstructured":"de Berg M., van Kreveld M., Overmars M., Schwarzkopf O.: Computational Geometry: Algorithms and Applications. Springer-Verlag, New York (1997)"},{"key":"145_CR5","doi-asserted-by":"crossref","unstructured":"Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. DBSec (2006)","DOI":"10.1007\/11805588_5"},{"key":"145_CR6","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. CCS (2003)","DOI":"10.1145\/948109.948124"},{"issue":"1","key":"145_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/310701.310710","volume":"24","author":"V. Datta","year":"1999","unstructured":"Datta V., Vandermeer D., Celik A., Kumar V.: Broadcast protocols to support efficient retrieval from databases by mobile users. ACM TODS 24(1), 1\u201379 (1999)","journal-title":"ACM TODS"},{"issue":"3","key":"145_CR8","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu P., Gertz M., Martel C., Stubblebine S.: Authentic data publication over the Internet. J. Comput. Secur. 11(3), 291\u2013314 (2003)","journal-title":"J. Comput. Secur."},{"key":"145_CR9","doi-asserted-by":"crossref","unstructured":"Getoor, L., Taskar, B., Koller, D.: Selectivity estimation using probability models. SIGMOD (2001)","DOI":"10.1145\/375663.375727"},{"key":"145_CR10","doi-asserted-by":"crossref","unstructured":"Goodrich, M., Tamassia, R., Triandopoulos, N., Cohen, R.: Authenticated data structures for graph and geometric searching. CT-RSA (2003)","DOI":"10.1007\/3-540-36563-X_20"},{"key":"145_CR11","doi-asserted-by":"crossref","unstructured":"Guha, S., Shim, K., Woo, J.: Rehist: Relative Error Histogram Construction Algorithms. VLDB (2004)","DOI":"10.1016\/B978-012088469-8.50029-2"},{"key":"145_CR12","doi-asserted-by":"crossref","unstructured":"Hac\u0131g\u00fcm\u00fc \u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. SIGMOD (2002)","DOI":"10.1145\/564691.564717"},{"key":"145_CR13","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Providing databases as a service. ICDE (2002)"},{"key":"145_CR14","doi-asserted-by":"crossref","unstructured":"Kundu, A., Bertino, E.: Structural signatures for tree data structures. VLDB (2008)","DOI":"10.14778\/1453856.1453876"},{"key":"145_CR15","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. SIGMOD (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"145_CR16","unstructured":"Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: enabling authentication of sliding window queries on streams. VLDB (2007)"},{"issue":"1","key":"145_CR17","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s00453-003-1076-8","volume":"39","author":"C. Martel","year":"2004","unstructured":"Martel C., Nuckolls G., Devanbu P., Gertz M., Kwong A., Stubblebine S.: A general model for authenticated data structures. Algorithmica 39(1), 21\u201341 (2004)","journal-title":"Algorithmica"},{"key":"145_CR18","unstructured":"Merkle, R.: A certified digital signature. CRYPTO (1989)"},{"key":"145_CR19","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: immutability for aggregated\/condensed signatures. ESORICS (2004)","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"145_CR20","doi-asserted-by":"crossref","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. DASFAA (2006)","DOI":"10.1007\/11733836_30"},{"key":"145_CR21","unstructured":"National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)"},{"key":"145_CR22","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. SIGMOD (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"145_CR23","doi-asserted-by":"crossref","unstructured":"Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. VLDB (2008)","DOI":"10.14778\/1453856.1453875"},{"key":"145_CR24","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.-L.: Authenticating query results in edge computing. ICDE (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"issue":"2","key":"145_CR25","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest R.L., Shamir A., Adleman L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"145_CR26","unstructured":"Sion, R.: Query execution assurance for outsourced databases. VLDB (2005)"},{"key":"145_CR27","doi-asserted-by":"crossref","unstructured":"Tamassia, R., Triandopoulos, N.: Efficient content authentication in peer-to-peer networks. International Conference on Applied Cryptography and Network Security (2007)","DOI":"10.1007\/978-3-540-72738-5_23"},{"key":"145_CR28","unstructured":"Wong, W.K., Cheung, D., Hung, E., Kao, B., Mamoulis, N.: Security in outsourcing of association rule mining. VLDB (2007)"},{"key":"145_CR29","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity audit of outsourced data. VLDB (2007)"},{"issue":"3","key":"145_CR30","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1007\/s00778-008-0113-2","volume":"18","author":"Y. Yang","year":"2009","unstructured":"Yang Y., Papadopoulos S., Papadias D., Kollios G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631 (2009)","journal-title":"VLDB J."},{"key":"145_CR31","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497517"},{"key":"145_CR32","doi-asserted-by":"crossref","unstructured":"Yi, K., Li, F., Hadjieleftheriou, M., Kollios, G., Srivastava, D.: Randomized synopses for query assurance on data streams. ICDE (2008)","DOI":"10.1109\/ICDE.2008.4497450"},{"key":"145_CR33","doi-asserted-by":"crossref","unstructured":"Zobel, J., Moffat, A.: Inverted files for text search engines. ACM Comput. Surv. 38(2), (2006)","DOI":"10.1145\/1132956.1132959"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-009-0145-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-009-0145-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-009-0145-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T15:05:05Z","timestamp":1559142305000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-009-0145-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,6]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4]]}},"alternative-id":["145"],"URL":"https:\/\/doi.org\/10.1007\/s00778-009-0145-2","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,6]]}}}