{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:35Z","timestamp":1750307495718,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,30]],"date-time":"2010-10-30T00:00:00Z","timestamp":1288396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,30]]},"DOI":"10.1145\/1871929.1871934","type":"proceedings-article","created":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T13:32:23Z","timestamp":1288618343000},"page":"25-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Towards a data-centric view of cloud security"],"prefix":"10.1145","author":[{"given":"Wenchao","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University, Washington, DC, USA"}]},{"given":"William R.","family":"Marczak","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, Berkeley, CA, USA"}]},{"given":"Zhuoyao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Tao","family":"Tao","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Insup","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"DS2: Declarative Secure Distributed Systems. http:\/\/netdb.cis.upenn.edu\/ds2\/.  DS2: Declarative Secure Distributed Systems. http:\/\/netdb.cis.upenn.edu\/ds2\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Stanford WebBase. http:\/\/diglib.stanford.edu:8091\/~testbed\/doc2\/WebBase\/.  Stanford WebBase. http:\/\/diglib.stanford.edu:8091\/~testbed\/doc2\/WebBase\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/788023.789068"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755937"},{"key":"e_1_3_2_1_5_1","unstructured":"The Appleseed Project. http:\/\/opensource.appleseedproject.org\/.  The Appleseed Project. http:\/\/opensource.appleseedproject.org\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Start Clicking. The New York Times","author":"Bilton N.","year":"2010","unstructured":"N. Bilton . Price of Facebook Privacy ? Start Clicking. The New York Times , 12 May 2010 . N. Bilton. Price of Facebook Privacy? Start Clicking. The New York Times, 12 May 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655022"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453978"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. OSDI","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . Mapreduce: Simplified data processing on large clusters . In Proc. OSDI , 2004 . J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In Proc. OSDI, 2004."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. IEEE S&P","author":"DeTreville J.","year":"2002","unstructured":"J. DeTreville . Binder : A logic-based security language . In Proc. IEEE S&P , 2002 . J. DeTreville. Binder: A logic-based security language. In Proc. IEEE S&P, 2002."},{"key":"e_1_3_2_1_12_1","unstructured":"Diaspora*. http:\/\/www.joindiaspora.com.  Diaspora*. http:\/\/www.joindiaspora.com."},{"key":"e_1_3_2_1_13_1","volume-title":"The New York Times","author":"Dwyer J.","year":"2010","unstructured":"J. Dwyer . Four Nerds and a Cry to Arms Against Facebook . The New York Times , 11 May 2010 . J. Dwyer. Four Nerds and a Cry to Arms Against Facebook. The New York Times, 11 May 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. VLDB","author":"Green T. J.","year":"2007","unstructured":"T. J. Green , G. Karvounarakis , Z. G. Ives , and V. Tannen . Update exchange with mappings and provenance . In Proc. VLDB , 2007 . T. J. Green, G. Karvounarakis, Z. G. Ives, and V. Tannen. Update exchange with mappings and provenance. In Proc. VLDB, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247631"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. FAST","author":"Hasan R.","year":"2009","unstructured":"R. Hasan , R. Sion , and M. Winslett . The case of the fake picasso: Preventing history forgery with secure provenance . In Proc. FAST , 2009 . R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: Preventing history forgery with secure provenance. In Proc. FAST, 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315480"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. CIDR","author":"Ives Z.","year":"2005","unstructured":"Z. Ives , N. Khandelwal , A. Kapur , and M. Cakir . Orchestra: Rapid, collaborative sharing of dynamic data . In Proc. CIDR , 2005 . Z. Ives, N. Khandelwal, A. Kapur, and M. Cakir. Orchestra: Rapid, collaborative sharing of dynamic data. In Proc. CIDR, 2005."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2009.60"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807269"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.36"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095818"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807246"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. CIDR","author":"Marczak W. R.","year":"2009","unstructured":"W. R. Marczak , D. Zook , W. Zhou , M. Aref , and B. T. Loo . Declarative reconfigurable trust management . In Proc. CIDR , 2009 . W. R. Marczak, D. Zook, W. Zhou, M. Aref, and B. T. Loo. Declarative reconfigurable trust management. In Proc. CIDR, 2009."},{"key":"e_1_3_2_1_30_1","unstructured":"R. C. Merkle. Secrecy Authentication and Public Key Systems. PhD thesis Stanford University 1979.   R. C. Merkle. Secrecy Authentication and Public Key Systems. PhD thesis Stanford University 1979."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-008-0108-z"},{"key":"e_1_3_2_1_32_1","volume-title":"SIGCOMM (demo)","author":"Muthukumar S. C.","year":"2009","unstructured":"S. C. Muthukumar , X. Li , C. Liu , J. B. Kopena , M. Oprea , and B. T. Loo . Declarative toolkit for rapid network protocol simulation and experimentation . In SIGCOMM (demo) , 2009 . S. C. Muthukumar, X. Li, C. Liu, J. B. Kopena, M. Oprea, and B. T. Loo. Declarative toolkit for rapid network protocol simulation and experimentation. In SIGCOMM (demo), 2009."},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. NDSS","author":"Mykletun E.","year":"2004","unstructured":"E. Mykletun , M. Narasimha , and G. Tsudik . Authentication and integrity in outsourced databases . In Proc. NDSS , 2004 . E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases. In Proc. NDSS, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2009.93"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330337"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.135"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655019"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. NDSS","author":"Sherr M.","year":"2010","unstructured":"M. Sherr , A. Mao , W. R. Marczak , W. Zhou , B. T. Loo , and M. Blaze . A3: An Extensible Platform for Application-Aware Anonymity . In Proc. NDSS , 2010 . M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Proc. NDSS, 2010."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655021"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.58"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"},{"key":"e_1_3_2_1_44_1","volume-title":"Answering Privacy Concerns with New Settings. The Washington Post","author":"Zuckerberg M.","year":"2010","unstructured":"M. Zuckerberg . From Facebook , Answering Privacy Concerns with New Settings. The Washington Post , 24 May 2010 . M. Zuckerberg. From Facebook, Answering Privacy Concerns with New Settings. The Washington Post, 24 May 2010."}],"event":{"name":"CIKM '10: International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Toronto ON Canada","acronym":"CIKM '10"},"container-title":["Proceedings of the second international workshop on Cloud data management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1871929.1871934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1871929.1871934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:39Z","timestamp":1750249059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1871929.1871934"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,30]]},"references-count":44,"alternative-id":["10.1145\/1871929.1871934","10.1145\/1871929"],"URL":"https:\/\/doi.org\/10.1145\/1871929.1871934","relation":{},"subject":[],"published":{"date-parts":[[2010,10,30]]},"assertion":[{"value":"2010-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}