{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:33:28Z","timestamp":1767904408888,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,14]],"date-time":"2005-06-14T00:00:00Z","timestamp":1118707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,14]]},"DOI":"10.1145\/1066157.1066204","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"407-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":199,"title":["Verifying completeness of relational query results in data publishing"],"prefix":"10.1145","author":[{"given":"HweeHwa","family":"Pang","sequence":"first","affiliation":[{"name":"Institute for Infocomm Research, Singapore"}]},{"given":"Arpit","family":"Jain","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Bombay, Powai, Mumbai"}]},{"given":"Krithi","family":"Ramamritham","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Bombay, Powai, Mumbai"}]},{"given":"Kian-Lee","family":"Tan","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2005,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DriveCrypt Secure Hard Disk Encryption. http:\/\/www.drivecrypt.com.]]  DriveCrypt Secure Hard Disk Encryption. http:\/\/www.drivecrypt.com.]]"},{"key":"e_1_3_2_1_2_1","unstructured":"E4M Disk Encryption. http:\/\/www.e4m.net.]]  E4M Disk Encryption. http:\/\/www.e4m.net.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"Encrypting File System (EFS) for Windows 2000. http:\/\/www.microsoft.com\/windows2000\/techinfo\/howit works\/security\/encrypt.asp.]]  Encrypting File System (EFS) for Windows 2000. http:\/\/www.microsoft.com\/windows2000\/techinfo\/howit works\/security\/encrypt.asp.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"PGP disk. http:\/\/www.pgpi.org\/products\/pgpdisk\/.]]  PGP disk. http:\/\/www.pgpi.org\/products\/pgpdisk\/.]]"},{"issue":"169","key":"e_1_3_2_1_5_1","first-page":"42980","volume":"56","author":"Information Processing Proposed Federal","year":"1991","unstructured":"Proposed Federal Information Processing Standard for Digital Signature Standard (DSS) . Federal Register , 56 ( 169 ): 42980 -- 42982 , 1991 .]] Proposed Federal Information Processing Standard for Digital Signature Standard (DSS). Federal Register, 56(169):42980--42982, 1991.]]","journal-title":"Federal Register"},{"key":"e_1_3_2_1_6_1","volume-title":"National Institute of Science and Technology. FIPS 180--2","author":"Algorithm Secure Hashing","year":"2001","unstructured":"Secure Hashing Algorithm . National Institute of Science and Technology. FIPS 180--2 , 2001 .]] Secure Hashing Algorithm. National Institute of Science and Technology. FIPS 180--2, 2001.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"2nd International Workshop, D. Aucsmith, Ed.","author":"Anderson R.","year":"1998","unstructured":"R. Anderson , R. Needham , and A. Shamir . The Steganographic File System. In Information Hiding , 2nd International Workshop, D. Aucsmith, Ed. , Portland, Oregon, USA , April 1998 .]] R. Anderson, R. Needham, and A. Shamir. The Steganographic File System. In Information Hiding, 2nd International Workshop, D. Aucsmith, Ed., Portland, Oregon, USA, April 1998.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1766171.1766207"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129907"},{"key":"e_1_3_2_1_10_1","first-page":"102","volume-title":"14th IFIP 11.3 Working Conference in Database Security","author":"Devanbu P.","year":"2000","unstructured":"P. Devanbu , M. Gertz , C. Martel , and S. Stubblebine . Authentic Data Publication over the Internet . In 14th IFIP 11.3 Working Conference in Database Security , pages 102 -- 112 , 2000 .]] P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic Data Publication over the Internet. In 14th IFIP 11.3 Working Conference in Database Security, pages 102--112, 2000.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315480"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564763"},{"key":"e_1_3_2_1_13_1","volume-title":"Submitted for Publication","author":"Ma D.","year":"2004","unstructured":"D. Ma , R. Deng , and H. Pang . Authenticating Query Results From Untrusted Servers Over Open Networks . In Submitted for Publication , 2004 .]] D. Ma, R. Deng, and H. Pang. Authenticating Query Results From Untrusted Servers Over Open Networks. In Submitted for Publication, 2004.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"May","author":"Margulius D.","year":"2002","unstructured":"D. Margulius . Apps on the Edge. Info World, 24(21) , May 2002 . http:\/\/www.infoworld.com\/article\/02\/05\/23\/020527feedgetci_1.html.]] D. Margulius. Apps on the Edge. Info World, 24(21), May 2002. http:\/\/www.infoworld.com\/article\/02\/05\/23\/020527feedgetci_1.html.]]"},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science","first-page":"218","volume-title":"Proceedings of Advances in Cryptology-Crypto '89","author":"Merkle R.","year":"1999","unstructured":"R. Merkle . A Certified Digital Signature . In Proceedings of Advances in Cryptology-Crypto '89 , Lecture Notes in Computer Science , volume 0435 , pages 218 -- 238 , 1999 .]] R. Merkle. A Certified Digital Signature. In Proceedings of Advances in Cryptology-Crypto '89, Lecture Notes in Computer Science, volume 0435, pages 218--238, 1999.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315528"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium","author":"Mykletun E.","year":"2004","unstructured":"E. Mykletun , M. Narasimha , and G. Tsudik . Authentication and Integrity in Outsourced Databases . In Proceedings of the Network and Distributed System Security Symposium , February 2004 .]] E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and Integrity in Outsourced Databases. In Proceedings of the Network and Distributed System Security Symposium, February 2004.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_10"},{"issue":"9","key":"e_1_3_2_1_19_1","first-page":"33","article-title":"Kerberos","volume":"32","author":"Neuman B.","year":"1994","unstructured":"B. Neuman and T. Tso . Kerberos : An Authentication Service for Computer Networks. IEEE Communications Magazine , 32 ( 9 ): 33 -- 38 , 1994 .]] B. Neuman and T. Tso. Kerberos: An Authentication Service for Computer Networks. IEEE Communications Magazine, 32(9):33--38, 1994.]]","journal-title":"An Authentication Service for Computer Networks. IEEE Communications Magazine"},{"key":"e_1_3_2_1_20_1","first-page":"560","volume-title":"Authenticating Query Results in Edge Computing. In IEEE International Conference on Data Engineering","author":"Pang H.","year":"2004","unstructured":"H. Pang and K. Tan . Authenticating Query Results in Edge Computing. In IEEE International Conference on Data Engineering , pages 560 -- 571 , March 2004 .]] H. Pang and K. Tan. Authenticating Query Results in Edge Computing. In IEEE International Conference on Data Engineering, pages 560--571, March 2004.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260829"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1321"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"R.\n      Rivest\n     and \n      A.\n      Shamir\n  . \n  PayWord and MicroMint: Two Simple Micropayment Schemes. In http:\/\/theory.lcs.mit.edu\/rivest\/RivestShamir-mpay.pdf (This version is dated\n  2001\n  ). An earlier version appears in Security Protocols Lecture Notes in Computer Science LNCS\n   1189 pp. \n  69\n  --\n  87 2001.]]   R. Rivest and A. Shamir. PayWord and MicroMint: Two Simple Micropayment Schemes. In http:\/\/theory.lcs.mit.edu\/rivest\/RivestShamir-mpay.pdf (This version is dated 2001). An earlier version appears in Security Protocols Lecture Notes in Computer Science LNCS 1189 pp. 69--87 2001.]]","DOI":"10.1007\/3-540-62494-5_6"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060319"}],"event":{"name":"SIGMOD\/PODS05: International Conference on Management of Data and Symposium on Principles Database and Systems","location":"Baltimore Maryland","acronym":"SIGMOD\/PODS05","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2005 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066157.1066204","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1066157.1066204","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:18Z","timestamp":1750262898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1066157.1066204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,14]]},"references-count":26,"alternative-id":["10.1145\/1066157.1066204","10.1145\/1066157"],"URL":"https:\/\/doi.org\/10.1145\/1066157.1066204","relation":{},"subject":[],"published":{"date-parts":[[2005,6,14]]},"assertion":[{"value":"2005-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}