{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T21:51:14Z","timestamp":1765057874850,"version":"3.33.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100017412","name":"BD","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017412","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825064","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"1566-1573","source":"Crossref","is-referenced-by-count":1,"title":["SecureSphere: Advancing Security and Robustness in Query Processing over Outsourced Data"],"prefix":"10.1109","author":[{"given":"Eray","family":"Dogan","sequence":"first","affiliation":[{"name":"TU Darmstadt,Darmstadt,Germany"}]},{"given":"Meghdad","family":"Mirabi","sequence":"additional","affiliation":[{"name":"DFKI &#x0026; TU Darmstadt,Darmstadt,Germany"}]},{"given":"Carsten","family":"Binnig","sequence":"additional","affiliation":[{"name":"TU Darmstadt &#x0026; DFKI,Darmstadt,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3136623"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.032211.00087"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.151"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.04.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1600240"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.08.003"},{"key":"ref8","first-page":"1","article-title":"QFilter: Towards a fine-grained access control for aggregation query processing over secret shared data","volume-title":"Proceedings of the 1st Workshop on Cloud Databases (CloudDB\u201923), Joint Workshop at 49th International Conference on Very Large Data Bases (VLDBW\u201923)","author":"Mirabi"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2545668"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101080"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3365998"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.10.006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2947061"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2347673.2347681"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0277-x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-022-04467-7"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2933844"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2983932"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.10.006"},{"key":"ref23","first-page":"1031","article-title":"SECRECY: Secure collaborative analytics in untrusted clouds","volume-title":"Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Liagouris"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5363"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2991\/ijndc.2014.2.4.5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099604"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_10"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11733836_30"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1521-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1064-4"},{"key":"ref31","first-page":"66","article-title":"Merkle hash tree based techniques for data integrity of outsourced data","volume-title":"Proceedings of 27th GI-Workshop on Foundations of Databases","author":"Niaz"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2019.03.002"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825064.pdf?arnumber=10825064","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:25:00Z","timestamp":1737102300000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825064\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825064","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}