{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:26:47Z","timestamp":1729654007611,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icdew.2007.4401060","type":"proceedings-article","created":{"date-parts":[[2007,12,18]],"date-time":"2007-12-18T14:56:26Z","timestamp":1197989786000},"page":"725-733","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing Secured Service Interoperability with Decentralized Orchestration"],"prefix":"10.1109","author":[{"given":"Ustun","family":"Yildiz","sequence":"first","affiliation":[]},{"given":"Claude","family":"Godart","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"103","article-title":"A secure and optimally efficient multi-authority election scheme","volume":"1233","author":"cramer","year":"1997","journal-title":"Proc Eurocrypt?96"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/319566.319580"},{"key":"ref12","first-page":"1","article-title":"Efficient private matching and set intersection","volume":"3027","author":"freedman","year":"2004","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"ref16","first-page":"241","article-title":"Privacy-preserving set operations","volume":"3621","author":"kissner","year":"2005","journal-title":"Proceedings of Advances in Cryptology CRYPTO'99"},{"key":"ref17","first-page":"232","article-title":"Chaos: An active security mediation system","volume":"1789","author":"liu","year":"2000","journal-title":"Proceedings of the International Conference on Advanced Information Systems Engineering"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/11805588_7","article-title":"Aggregation queries in the database-as-a-service model","volume":"4127","author":"mykletun","year":"2006","journal-title":"Data and Applications Security XX"},{"key":"ref19","first-page":"133","article-title":"Anti-tamper databases: Querying encrypted databases","author":"\u00f6zsoyoglu","year":"2003","journal-title":"Data and Applications Security XVII"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/11535706_20","article-title":"Secure mediation with mobile code","volume":"3654","author":"biskup","year":"2005","journal-title":"Data and Applications Security XIX"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3233\/JCS-2003-11306","article-title":"Secure mediation: Requirements, design, and architecture","volume":"11","author":"altenschmidt","year":"2003","journal-title":"Journal of Computer Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/237814.238015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.1996.492086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053289"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099575"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3-540-36233-9_9","article-title":"Explicit representation of constrained schema mappings for mediated data integration","volume":"2544","author":"altenschmidt","year":"2002","journal-title":"Databases in Networked Information Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2006.30"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1007\/11805588_22","article-title":"Information theoretical analysis of two-party secret computation","volume":"4127","author":"wang","year":"2006","journal-title":"Data and Applications Security XX"},{"journal-title":"Homomorphic Cryptosystems and Their Applications","year":"2004","author":"rappe","key":"ref21"},{"key":"ref24","first-page":"479","article-title":"Privacy-preserving queries on encrypted data","volume":"4189","author":"yang","year":"2006","journal-title":"Proceedings of the Second European Symposium on Research in Computer Security"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/64.621227"}],"event":{"name":"2007 IEEE 23rd International Conference on Data Engineering Workshop","start":{"date-parts":[[2007,4,17]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 IEEE 23rd International Conference on Data Engineering Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4400942\/4400943\/04401060.pdf?arnumber=4401060","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T22:15:15Z","timestamp":1557094515000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4401060\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icdew.2007.4401060","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}