{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T12:44:17Z","timestamp":1725453857907},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642325830"},{"type":"electronic","value":"9783642325847"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32584-7_33","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T11:53:13Z","timestamp":1346154793000},"page":"404-416","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective"],"prefix":"10.1007","author":[{"given":"Ricardo Jorge","family":"Santos","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"3DES. Triple DES. National Institute of Standards and Technology (NIST), Federal Information Processing Standards (FIPS), Pub. 800-67, ISO\/IEC 18033-3 (2005)"},{"key":"33_CR2","unstructured":"AES. Advanced Encryption Standard. NIST, FIPS-197 (2001)"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-Preserving Encryption for Numeric Data. In: ACM SIG Int. Conference on Management of Data, SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy Preserving OLAP. In: ACM Int. Conference of the Special Interest Group on Management of Data, SIGMOD (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Bertino, E., Sandhu, R.: Database Security \u2013 Concepts, Approaches, and Challenges. IEEE Transactions on Dependable and Secure Computing\u00a02(1) (2005)","DOI":"10.1109\/TDSC.2005.9"},{"key":"33_CR6","unstructured":"DES. Data Encryption Standard. National Inst. of Standards and Technology (NIST). FIPS Pub. 46 (1977)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Ge, T., Zdonik, S.: Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. In: International Conference on Data Engineering, ICDE (2007)","DOI":"10.1109\/ICDE.2007.367913"},{"key":"33_CR8","unstructured":"Huey, P.: Oracle Database Security Guide 11g. Oracle Corporation (2008)"},{"key":"33_CR9","unstructured":"Kimball, R., Ross, M.: The Data Warehouse Toolkit, 2nd edn. Wiley & Sons, Inc. (2002)"},{"key":"33_CR10","unstructured":"Nadeem, A., Javed, M.Y.: A Performance Comparison of Data Encryption Algorithms. In: Int. Conf. on Information and Communication Technologies, ICICT (2005)"},{"key":"33_CR11","unstructured":"Natan, R.B.: Implementing Database Security and Auditing. Digital Press (2005)"},{"key":"33_CR12","unstructured":"Oracle Corporation. Data Masking Best Practices, Oracle White Paper (2010)"},{"key":"33_CR13","unstructured":"Oracle Corporation. Oracle Advanced Security Transparent Data Encryption Best Practices, Oracle White Paper (2010)"},{"key":"33_CR14","unstructured":"Procopiuc, C.M., Srivastava, D.: Efficient Table Anonymization for Aggregate Query Answering. In: Int. Conf. on Data Engineering, ICDE (2011)"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11593980_12","volume-title":"Information Systems Security","author":"V. Radha","year":"2005","unstructured":"Radha, V., Kumar, N.H.: EISA - An Enterprise Application Security Solution for Databases. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 164\u2013176. Springer, Heidelberg (2005)"},{"key":"33_CR16","unstructured":"Ravikumar, G.K., Manjunath, T.N., Ravindra, S.H., Umesh, I.M.: A Survey on Recent Trends, Process and Development in Data Masking for Testing. International Journal of Computer Science Issues\u00a08(2) (2011)"},{"key":"33_CR17","unstructured":"TPC-H. The TPC Decision Support Benchmark H, \n                    \n                      http:\/\/www.tpc.org\/tpch\/default.asp"},{"key":"33_CR18","unstructured":"Vimercati, S.C., Foresti, S., Jajodia, S., Paraboschi, Samarati, P.: Over-encryption: Management of Access Control Evolution and Outsourced Data. In: International Conference on Very Large DataBases, VLDB (2007)"},{"key":"33_CR19","unstructured":"Xiao, X., Bender, G., Hay, M., Gehrke, J.: iReduct: Differential Privacy with Reduced Relative Errors. In: ACM SIG Int. Conf. on Management of Data, SIGMOD (2009)"},{"key":"33_CR20","unstructured":"Yuhanna, N.: Your Enterprise Database Security Strategy. Forrester Research (2010)"},{"key":"33_CR21","unstructured":"Gartner Inc. Selection Criteria for Data-Masking Technologies. Research Report ID G00165388 (February 2009)"},{"key":"33_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 Family of Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"33_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","volume-title":"Database Systems for Advanced Applications","author":"H. Hac\u0131g\u00fcm\u00fc\u015f","year":"2004","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Mehrotra, S.: Efficient Execution of Aggregation Queries over Encrypted Relational Databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"33_CR24","unstructured":"Schneier, B.: The Blowfish Encryption Algorithm, \n                    \n                      http:\/\/www.schneier.com\/blowfish.html"},{"key":"33_CR25","unstructured":"Elminaam, D., Kader, H., Hadhoud, M.: Evaluating the Performance of Symmetric Encryption Algorithms. Int. Journal of Network Security\u00a010(3) (2010)"},{"key":"33_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New AES Software Speed Records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Data Warehousing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32584-7_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:07:52Z","timestamp":1620130072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32584-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642325830","9783642325847"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32584-7_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}