{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T21:52:45Z","timestamp":1725659565527},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/spac.2017.8304356","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T18:52:04Z","timestamp":1520016724000},"page":"648-653","source":"Crossref","is-referenced-by-count":3,"title":["SafeBox: A scheme for searching and sharing encrypted data in cloud applications"],"prefix":"10.1109","author":[{"given":"Guofeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yingfei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Hezhong","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Peiyi","family":"Han","sequence":"additional","affiliation":[]},{"given":"Binxing","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"33","article-title":"Mimesis aegis: A mimicry privacy shielda systems approach to data privacy on public cloud[C]","author":"lau","year":"2014","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref11","first-page":"157","article-title":"Building web applications on top of encrypted data using Mylar[C]","author":"popa","year":"2014","journal-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref13","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_17"},{"key":"ref16","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes[C]","author":"shamir","year":"1984","journal-title":"Workshop on the Theory and Application of Cryptographic Techniques"},{"key":"ref17","first-page":"213","article-title":"Identity-based encryption from the Weil pairing[C]","author":"boneh","year":"2001","journal-title":"6th Annual International Cryptology Conference"},{"key":"ref18","article-title":"Introduction to Information Retrieval[C]","author":"schtze","year":"2008","journal-title":"Proceedings of the international communication of association for computing machinery conference"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-002-0082-8"},{"key":"ref4","first-page":"216","article-title":"Secure Indexes","author":"goh","year":"2003","journal-title":"International Association for Cryptologic Research Cryptology ePrint Archive"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/SECPRI.2000.848445","article-title":"Practical techniques for searches on encrypted data[C]","author":"song","year":"2000","journal-title":"Security and Privacy 2000 S&P 2000 Proceedings 2000 IEEE Symposium on"},{"journal-title":"How to Evaluate and Operate a Cloud Access Security Broker","article-title":"Gartner Report","year":"2015","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"journal-title":"Cipher","year":"0","key":"ref8"},{"journal-title":"Skyhigh Networks","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660326"},{"journal-title":"CSA's Cloud Computing Top Threats in 2016&#x201D; Cloud Security Top Threats Working Group","year":"2016","author":"alliance","key":"ref1"},{"journal-title":"Elasticsearch","year":"0","key":"ref20"},{"journal-title":"QQ Webmail","year":"0","key":"ref22"},{"journal-title":"PBC Pairing Based Cryptography","year":"0","key":"ref21"},{"journal-title":"Youshang","year":"0","key":"ref24"},{"journal-title":"Baidu network disk","year":"0","key":"ref23"},{"journal-title":"Rally","year":"0","key":"ref25"}],"event":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8300290\/8304236\/08304356.pdf?arnumber=8304356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T01:13:05Z","timestamp":1570842785000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/spac.2017.8304356","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}