{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:01:21Z","timestamp":1772064081597,"version":"3.50.1"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icde.2013.6544921","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T19:02:52Z","timestamp":1372273372000},"page":"1268-1271","source":"Crossref","is-referenced-by-count":19,"title":["Secure and privacy-preserving database services in the cloud"],"prefix":"10.1109","author":[{"given":"D.","family":"Agrawal","sequence":"first","affiliation":[]},{"given":"A. E.","family":"Abbadi","sequence":"additional","affiliation":[]},{"family":"Shiyuan Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"35","first-page":"710","article-title":"Efficient and private access to outsourced data","author":"de capitani di vimercati","year":"0","journal-title":"Proc Of the 31st International Conference on Distributed Computing Systems (ICDCS 2011) June 2011"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"36","first-page":"1","article-title":"Generalizing pir for practical private retrieval of public data","author":"wang","year":"2010","journal-title":"Proceedings of the 24th Annual IFIP WG 11 3 Working Conference on Data and Applications Security and Privacy (DBSec)"},{"key":"18","first-page":"519","article-title":"Answering aggregation queries in a secure system model","author":"ge","year":"0","journal-title":"Proc 2007 Intl Conf on Very Large Data Bases"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455790"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367913"},{"key":"34","article-title":"Towards practical oblivious RAM","author":"stefanov","year":"2011","journal-title":"CoRR"},{"key":"16","first-page":"52","article-title":"A comprehensive framework for secure query processing on relational data in the cloud","author":"wang","year":"2011","journal-title":"SDM '11"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367569"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/948121.948124"},{"key":"14","first-page":"54","article-title":"Designing secure indexes for encrypted databases","author":"shmueli","year":"0","journal-title":"Proceedings of the IFIP Conference on Database and Applications Security 2005"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-012-7118-y"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"41","first-page":"293","article-title":"Enforcing end-to-end application security in the cloud (big ideas paper)","author":"bacon","year":"2010","journal-title":"Middleware'10"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2011.247061"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.1"},{"key":"24","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"HotCloud'09"},{"key":"25","article-title":"Orthogonal security with cipherbase","author":"arasu","year":"0","journal-title":"CIDR"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"29","article-title":"On the computational practicality of private information retrieval","author":"sion","year":"0","journal-title":"Network and Distributed System Security Symposium 2007"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"2","year":"2009","journal-title":"AWS Case Studies"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"1","year":"2009","journal-title":"AWS Solution Providers"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595308"},{"key":"7","year":"2011","journal-title":"Amazon Web Services Overview of Security Processes"},{"key":"6","author":"schwartz","year":"2011","journal-title":"Twitter Finalizes Ftc Security Settlement"},{"key":"32","article-title":"Usable private information retrieval","author":"williams","year":"0","journal-title":"Network and Distributed System Security Symposium 2008"},{"key":"5","author":"mccullagh","year":"2010","journal-title":"Privacy Leaks Hit Facebook Google At&t"},{"key":"31","first-page":"158","article-title":"Revisiting the computational practicality of private information retrieval","author":"olumofin","year":"0","journal-title":"Proceedings of the 15th International Conference on Financial Cryptography and Data Security 2011"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046664"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"8","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/SECPRI.2000.848445","article-title":"Practical techniques for searches on encrypted data","author":"song","year":"0","journal-title":"SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy 2000"}],"event":{"name":"2013 29th IEEE International Conference on Data Engineering (ICDE 2013)","location":"Brisbane, QLD","start":{"date-parts":[[2013,4,8]]},"end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 IEEE 29th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530811\/6544790\/06544921.pdf?arnumber=6544921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T15:18:44Z","timestamp":1498058324000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6544921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/icde.2013.6544921","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}