{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:01:18Z","timestamp":1729620078620,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553802","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T14:35:25Z","timestamp":1215095725000},"page":"8-15","source":"Crossref","is-referenced-by-count":1,"title":["A structure preserving approach for securing XML documents"],"prefix":"10.1109","author":[{"given":"Mohamed","family":"Nabeel","sequence":"first","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"XML path language (XPath) 2 0","year":"2007","author":"berglund","key":"ref10"},{"journal-title":"Secure Hash Signature Standard (SHS) (FIPS PUB 180&#x2013;2)","year":"2001","key":"ref11"},{"key":"ref12","first-page":"218","article-title":"A certified digital signature","author":"merkle","year":"1989","journal-title":"Advances in Cryptology Proceedings - CRYPTO '89"},{"journal-title":"Canonical XML Version 1 0 W3C Recommendation","year":"2001","author":"boyer","key":"ref13"},{"journal-title":"Exclusive XML Canonicalization Version 1 0 W3C Recommendation","year":"2002","author":"boyer","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935172"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373264"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"journal-title":"The base16 base32 and base64 data encodings (rfc3548)","year":"2003","author":"josefsson","key":"ref18"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1972","author":"gamma","key":"ref19"},{"key":"ref4","first-page":"216","article-title":"Executing sql over encrypted data in the database-service-provider model","author":"hacig","year":"2002","journal-title":"SIGMOD '02 Proceedings of the 2002 ACM SIGMOD international conference on Management of data"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/EDOC.2006.46","article-title":"Secure dissemination of xml content using structure-based routing","author":"kundu","year":"2006","journal-title":"EDOC &#x2018;06 Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC&#x2019;06)"},{"journal-title":"Extensible Markup Language (XML) 1 0 (fourth edition)","year":"2006","author":"consortium","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"journal-title":"XML Information Set (Second Edition)","year":"2004","author":"cowan","key":"ref8"},{"journal-title":"Document Object Model","year":"1998","author":"consortium","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.130"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802184"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1263","DOI":"10.1109\/TKDE.2004.63","article-title":"Selective and authentic third-party distribution of xml documents","volume":"16","author":"carminati","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"journal-title":"Apache xml security library","year":"2007","author":"foundation","key":"ref20"},{"journal-title":"XML encryption syntax and processing","year":"2002","author":"consortium","key":"ref22"},{"journal-title":"XML-signature syntax and processing","year":"2002","author":"consortium","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/545186.545190"},{"journal-title":"Bouncy castle security provider","year":"2007","author":"castle","key":"ref23"},{"key":"ref25","first-page":"281","article-title":"Secure distribution of events in content-based publish subscribe systems","author":"opyrchal","year":"2001","journal-title":"10th USENIX security symposium"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553802.pdf?arnumber=4553802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:38:05Z","timestamp":1497778685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553802","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}