{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:42:00Z","timestamp":1730274120886,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/isi.2012.6281922","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T20:57:57Z","timestamp":1346360277000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Cloud-enabled data sharing model"],"prefix":"10.1109","author":[{"given":"Nguyen Thanh","family":"Hung","sequence":"first","affiliation":[]},{"given":"Do Hoang","family":"Giang","sequence":"additional","affiliation":[]},{"given":"Ng Wee","family":"Keong","sequence":"additional","affiliation":[]},{"given":"Huafei","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Public-key encryption with keyword search","author":"boneh","year":"0","journal-title":"Proc of Eurocrypt 2004 Interlaken Switzerland May 2004"},{"key":"2","first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Eurocrypt"},{"key":"10","first-page":"31","article-title":"Secure Conjunctive Keyword Search over Encrypted Data","author":"golle","year":"0","journal-title":"Applied Cryptography and Network Security ACNS'04"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"6","first-page":"479","article-title":"Privacy-preserving queries on encrypted data","author":"yang","year":"2006","journal-title":"ES-ORICS European Symposium on Research in Computer Security"},{"journal-title":"Secure Indexes","year":"0","author":"goh","key":"5"},{"key":"4","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proc Crypto 01"},{"key":"9","first-page":"64","article-title":"Multi-User Private Queries over Encrypted Databases","volume":"1","author":"yang","year":"0","journal-title":"Int J High Performance Computing and Networking"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.07.011"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103792"}],"event":{"name":"2012 IEEE International Conference on Intelligence and Security Informatics (ISI 2012)","start":{"date-parts":[[2012,6,11]]},"location":"Washington, DC, USA","end":{"date-parts":[[2012,6,14]]}},"container-title":["2012 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269208\/6281845\/06281922.pdf?arnumber=6281922","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:57:50Z","timestamp":1490133470000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6281922\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isi.2012.6281922","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}