{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T14:32:02Z","timestamp":1725460322305},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374494"},{"type":"electronic","value":"9783642374500"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37450-0_6","type":"book-chapter","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T01:41:52Z","timestamp":1366162912000},"page":"84-98","source":"Crossref","is-referenced-by-count":2,"title":["A Specific Encryption Solution for Data Warehouses"],"prefix":"10.1007","author":[{"given":"Ricardo Jorge","family":"Santos","sequence":"first","affiliation":[]},{"given":"Deolinda","family":"Rasteiro","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"3DES, Triple DES, National Bureau of Standards, Nat. Inst. of Standards and Technology (NIST), Fed. Inform. Processing Standards (FIPS) Pub. 800-67, ISO\/IEC 18033-3 (2005)"},{"key":"6_CR2","unstructured":"AES, Advanced Encryption Standard. NIST, FIPS-197 (2001)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-Preserving Encryption for Numeric Data. In: ACM SIG Conf. on Management Of Data, SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy Preserving OLAP. In: ACM SIG Conf. Management Of Data, SIGMOD (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"6_CR5","unstructured":"Bernstein, D.J.: Snuffle 2005: The Salsa Encryption Function, \n                    \n                      http:\/\/cr.yp.to\/snuffle.html"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-68351-3_8","volume-title":"New Stream Cipher Designs","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J.: The Salsa20 Family of Stream Ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol.\u00a04986, pp. 84\u201397. Springer, Heidelberg (2008)"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-540-89754-5_25","volume-title":"Progress in Cryptology - INDOCRYPT 2008","author":"D.J. Bernstein","year":"2008","unstructured":"Bernstein, D.J., Schwabe, P.: New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol.\u00a05365, pp. 322\u2013336. Springer, Heidelberg (2008)"},{"key":"6_CR8","unstructured":"DES, Data Encryption Standard, National Bureau of Standards, Nat. Inst. of Standards and Technology (NIST), Federal Inform. Processing Standards (FIPS) Pub 46 (1977)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ge, T., Zdonik, S.: Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. In: Int. Conf. Data Engineering, ICDE (2007)","DOI":"10.1109\/ICDE.2007.367913"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database-Service-Provider Model. ACM C. Management of Data, SIGMOD (2002)","DOI":"10.1145\/564716.564717"},{"key":"6_CR11","unstructured":"Huey, P.: Oracle Database Security Guide 11g. Oracle Corp. (2008)"},{"key":"6_CR12","unstructured":"Kimball, R., Ross, M.: The Data Warehouse Toolkit, 2nd edn. Wiley & Sons Inc. (2002)"},{"key":"6_CR13","unstructured":"Nadeem, A., Javed, M.Y.: A Performance Comparison of Data Encryption Algorithms. In: IEEE Int. Conf. on Information and Communication Technologies, ICICT (2005)"},{"key":"6_CR14","unstructured":"Oracle Corporation, Oracle Advanced Security Transparent Data Encryption Best Practices, Oracle White Paper (July 2010)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/11593980_12","volume-title":"Information Systems Security","author":"V. Radha","year":"2005","unstructured":"Radha, V., Kumar, N.H.: EISA - An Enterprise Application Security Solution for Databases. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol.\u00a03803, pp. 164\u2013176. Springer, Heidelberg (2005)"},{"key":"6_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1007\/978-3-642-32584-7_33","volume-title":"Data Warehousing and Knowledge Discovery","author":"R.J. Santos","year":"2012","unstructured":"Santos, R.J., Bernardino, J., Vieira, M.: Evaluating the Feasibility Issues of Data Confidentiality Solutions from a Data Warehousing Perspective. In: Cuzzocrea, A., Dayal, U. (eds.) DaWaK 2012. LNCS, vol.\u00a07448, pp. 404\u2013416. Springer, Heidelberg (2012)"},{"key":"6_CR17","unstructured":"Transaction Processing Council, The TPC Decision Support Benchmark H, \n                    \n                      http:\/\/www.tpc.org\/tpch\/default.asp"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37450-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T06:49:36Z","timestamp":1557643776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37450-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374494","9783642374500"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37450-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}