{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:55:20Z","timestamp":1725720920929},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1109\/icacci.2013.6637173","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T19:21:09Z","timestamp":1383074469000},"page":"213-218","source":"Crossref","is-referenced-by-count":5,"title":["SignedQuery: Protecting users data in multi-tenant SaaS environments"],"prefix":"10.1109","author":[{"given":"Eyad","family":"Saleh","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Takouna","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"17","article-title":"Executing SQL over encrypted data in the database-service-provider model","author":"haclgumus","year":"2002","journal-title":"Proc of ACM SIGMOD"},{"key":"18","article-title":"Efcient secure query evaluation over encrypted XML databases","author":"wang","year":"2006","journal-title":"Proc of VLDB"},{"key":"15","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Proc of EUROCRYPT"},{"key":"16","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"Proc of HotCloud"},{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"year":"2013","key":"11"},{"year":"0","key":"12"},{"journal-title":"Musto Forrester Research","year":"2013","author":"bartels","key":"21"},{"year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.256"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.122"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038926"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.146"},{"journal-title":"Above the Clouds A Berkeley View of Cloud Computing","year":"2009","author":"armbrust","key":"3"},{"year":"0","key":"2"},{"year":"2013","key":"10"},{"key":"1","article-title":"The future of software licensing: Software licensing under siege","author":"konary","year":"2004","journal-title":"International Data Corporation"},{"key":"7","article-title":"Computing on encrypted data","author":"saha","year":"2008","journal-title":"ICIS 2008 Proceedings"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2009.5201385"},{"journal-title":"Data Is More Secure in the Cloud","year":"2013","author":"espiner","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.84"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"8"}],"event":{"name":"2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2013,8,22]]},"location":"Mysore","end":{"date-parts":[[2013,8,25]]}},"container-title":["2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621059\/6637135\/06637173.pdf?arnumber=6637173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T18:55:29Z","timestamp":1490208929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6637173\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icacci.2013.6637173","relation":{},"subject":[],"published":{"date-parts":[[2013,8]]}}}