{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:02Z","timestamp":1759091702004,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,7]],"date-time":"2014-11-07T00:00:00Z","timestamp":1415318400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,7]]},"DOI":"10.1145\/2663715.2669613","type":"proceedings-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T14:41:51Z","timestamp":1415025711000},"page":"37-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Skyline Query Processing over Encrypted Data"],"prefix":"10.1145","author":[{"given":"Suvarna","family":"Bothe","sequence":"first","affiliation":[{"name":"Rutgers University, Newark, NJ, USA"}]},{"given":"Alfredo","family":"Cuzzocrea","sequence":"additional","affiliation":[{"name":"ICAR-CNR and University of Calabria, Rende, Italy"}]},{"given":"Panagiotis","family":"Karras","sequence":"additional","affiliation":[{"name":"Skolkovo Institute of Science and Technology, Skolkovo, Russian Fed."}]},{"given":"Akrivi","family":"Vlachou","sequence":"additional","affiliation":[{"name":"Norwegian University of Science and Technology, Trondheim, Norway"}]}],"member":"320","published-online":{"date-parts":[[2014,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687731"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951432"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544921"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588893"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2013.6710554"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/645484.656550"},{"key":"e_1_3_2_1_10_1","first-page":"177","volume-title":"Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security","author":"Canim M.","year":"2007","unstructured":"M. Canim and M. Kantarcioglu . Design and analysis of querying encrypted data in relational databases . In Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security , Redondo Beach, CA, USA , July 8-11, 2007 , Proceedings , pages 177 -- 194 , 2007. M. Canim and M. Kantarcioglu. Design and analysis of querying encrypted data in relational databases. In Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pages 177--194, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04219-5_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260846"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687576"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402755.3402759"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.152"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85836-2_10"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871940.1871960"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2064676.2064695"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_20_1","first-page":"4","article-title":"Risk perception and trust in cloud","author":"Farahmand F.","year":"2010","unstructured":"F. Farahmand . Risk perception and trust in cloud . ISACA Journal , 4 , 2010 . F. Farahmand. Risk perception and trust in cloud. ISACA Journal, 4, 2010.","journal-title":"ISACA Journal"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11574620_24"},{"key":"e_1_3_2_1_23_1","first-page":"229","volume-title":"VLDB","author":"Godfrey P.","year":"2005","unstructured":"P. Godfrey , R. Shipley , and J. Gryz . Maximal vector computation in large data sets . In VLDB , pages 229 -- 240 , 2005 . P. Godfrey, R. Shipley, and J. Gryz. Maximal vector computation in large data sets. In VLDB, pages 229--240, 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/975541"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_26_1","first-page":"125","volume-title":"9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004","author":"Hacig\u00fcm\u00fcs H.","year":"2004","unstructured":"H. Hacig\u00fcm\u00fcs , B. R. Iyer , and S. Mehrotra . Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advances Applications , 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004 , Proceedings , pages 125 -- 136 , 2004 . H. Hacig\u00fcm\u00fcs, B. R. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In Database Systems for Advances Applications, 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004, Proceedings, pages 125--136, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/876875.879015"},{"key":"e_1_3_2_1_28_1","first-page":"261","volume-title":"CIDR 2011, Fifth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 9-12, 2011, Online Proceedings","author":"Herodotou H.","year":"2011","unstructured":"H. Herodotou , H. Lim , G. Luo , N. Borisov , L. Dong , F. B. Cetin , and S. Babu . Starfish: A self-tuning system for big data analytics . In CIDR 2011, Fifth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 9-12, 2011, Online Proceedings , pages 261 -- 272 , 2011 . H. Herodotou, H. Lim, G. Luo, N. Borisov, L. Dong, F. B. Cetin, and S. Babu. Starfish: A self-tuning system for big data analytics. In CIDR 2011, Fifth Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, January 9-12, 2011, Online Proceedings, pages 261--272, 2011."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2247596.2247665"},{"key":"e_1_3_2_1_30_1","volume-title":"editor","author":"Manyika B. B. J. B. R. D. C. R. A. B. J.","year":"2011","unstructured":"B. B. J. B. R. D. C. R. A. B. J. Manyika , M. Chui , editor . Big Data : The Next Frontier for Innovation, Competition, and Productivity. McKinsey Global Institute , 2011 . B. B. J. B. R. D. C. R. A. B. J. Manyika, M. Chui, editor. Big Data: The Next Frontier for Innovation, Competition, and Productivity. McKinsey Global Institute, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.Congress.2013.39"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523680"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.06.029"},{"key":"e_1_3_2_1_34_1","first-page":"195","volume-title":"DaWaK 2014, Munich, Germany, September 2-4, 2014. Proceedings","author":"Lopes C. C.","year":"2014","unstructured":"C. C. Lopes , V. C. Times , S. Matwin , R. R. Ciferri , and C. D. de Aguiar Ciferri. Processing OLAP queries over an encrypted data warehouse stored in the cloud. In Data Warehousing and Knowledge Discovery - 16th International Conference , DaWaK 2014, Munich, Germany, September 2-4, 2014. Proceedings , pages 195 -- 207 , 2014 . C. C. Lopes, V. C. Times, S. Matwin, R. R. Ciferri, and C. D. de Aguiar Ciferri. Processing OLAP queries over an encrypted data warehouse stored in the cloud. In Data Warehousing and Knowledge Discovery - 16th International Conference, DaWaK 2014, Munich, Germany, September 2-4, 2014. Proceedings, pages 195--207, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872814"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2390021.2390032"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691688"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0169-7"},{"key":"e_1_3_2_1_41_1","volume-title":"Master's thesis","author":"Zenginler T.","year":"2007","unstructured":"T. Zenginler . Secure skyline querying. Master's thesis , Bogazi\u00e7i University , 2007 . T. Zenginler. Secure skyline querying. Master's thesis, Bogazi\u00e7i University, 2007."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871929.1871931"}],"event":{"name":"CIKM '14: 2014 ACM Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Shanghai China","acronym":"CIKM '14"},"container-title":["Proceedings of the First International Workshop on Privacy and Secuirty of Big Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669613","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2663715.2669613","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:48Z","timestamp":1750227168000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2663715.2669613"}},"subtitle":["An Attribute-Order-Preserving-Free Approach"],"short-title":[],"issued":{"date-parts":[[2014,11,7]]},"references-count":42,"alternative-id":["10.1145\/2663715.2669613","10.1145\/2663715"],"URL":"https:\/\/doi.org\/10.1145\/2663715.2669613","relation":{},"subject":[],"published":{"date-parts":[[2014,11,7]]},"assertion":[{"value":"2014-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}