{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T06:54:20Z","timestamp":1768546460037,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/hpcsim.2011.5999865","type":"proceedings-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T15:18:55Z","timestamp":1314803935000},"page":"491-497","source":"Crossref","is-referenced-by-count":5,"title":["Access control enforcement on outsourced data ensuring privacy of access control policies"],"prefix":"10.1109","author":[{"given":"Parastou","family":"Tourani","sequence":"first","affiliation":[]},{"given":"Mohammad Ali","family":"Hadavi","sequence":"additional","affiliation":[]},{"given":"Rasool","family":"Jalili","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/11556992_33","article-title":"A cryptographic solution for general access control","author":"kong","year":"2005","journal-title":"Information Security 7th International Conference"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04773-6"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","author":"menezes","year":"1996","journal-title":"Handbook of Applied Cryptography"},{"key":"15","article-title":"Over-encryption: Management of access control evolution on outsourced data","author":"de capitani di vimercati","year":"2007","journal-title":"22nd VLDB Conference"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102147","article-title":"Dynamic and efficient key management for access hierarchies","author":"atallah","year":"2005","journal-title":"12th ACM CCS"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.03.009"},{"key":"14","year":"0","journal-title":"Diffie-hellman Key Agreement Standard"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/11552338_2","article-title":"Metadata management in outsourced encrypted databases","author":"damiani","year":"2005","journal-title":"2nd VLDB Workshop on Secure Data Management (SDM'05)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8070-0_5"},{"key":"20","author":"stallings","year":"1999","journal-title":"Cryptography and Network Security Principles and Practice"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/948121.948124"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2003.10006"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.20"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456417"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.11.003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314477"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775432"}],"event":{"name":"Simulation (HPCS)","location":"Istanbul, Turkey","start":{"date-parts":[[2011,7,4]]},"end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5979720\/5999789\/05999865.pdf?arnumber=5999865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T01:27:42Z","timestamp":1497922062000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5999865\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2011.5999865","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}