{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:17Z","timestamp":1750308557130,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,27]],"date-time":"2015-05-27T00:00:00Z","timestamp":1432684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ANR France","award":["ANR-11-INSE-0005"],"award-info":[{"award-number":["ANR-11-INSE-0005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,27]]},"DOI":"10.1145\/2723372.2735376","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T05:35:02Z","timestamp":1433223302000},"page":"1445-1450","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Secure Search Engine for the Personal Cloud"],"prefix":"10.1145","author":[{"given":"Saliha","family":"Lallali","sequence":"first","affiliation":[{"name":"INRIA Rocquencourt, Rocquencourt, France"}]},{"given":"Nicolas","family":"Anciaux","sequence":"additional","affiliation":[{"name":"INRIA Rocquencourt, Rocquencourt, France"}]},{"given":"Iulian","family":"Sandu Popa","sequence":"additional","affiliation":[{"name":"INRIA Rocquencourt, Rocquencourt, France"}]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[{"name":"INRIA Rocquencourt, Rocquencourt, France"}]}],"member":"320","published-online":{"date-parts":[[2015,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6309-2_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687669"},{"key":"e_1_3_2_1_3_1","volume-title":"CIDR","author":"Anciaux N.","year":"2013","unstructured":"Anciaux , N. , Bonnet , P. , Bouganim , L. , Nguyen , B. , Sandu Popa , I. , and P. Pucheral . Trusted cells: A sea change for personal data services . In CIDR , 2013 . Anciaux, N., Bonnet, P., Bouganim, L., Nguyen, B., Sandu Popa, I., and P. Pucheral. Trusted cells: A sea change for personal data services. In CIDR, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-012-7119-x"},{"key":"e_1_3_2_1_5_1","unstructured":"Anciaux N. Lallali S. Sandu-Popa I. Pucheral P. A Scalable Search Engine for Mass Storage Smart Objects. Technical report accessible at: http:\/\/www.prism.uvsq.fr\/~isap\/files\/RT.pdf.  Anciaux N. Lallali S. Sandu-Popa I. Pucheral P. A Scalable Search Engine for Mass Storage Smart Objects. Technical report accessible at: http:\/\/www.prism.uvsq.fr\/~isap\/files\/RT.pdf."},{"key":"e_1_3_2_1_6_1","volume-title":"AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0","author":"Yeung C., A.","year":"2009","unstructured":"Yeung , C., A. , Kagal , L. , Gibbin , N. , Shadbolt , N. Providing Access Control to Online Photo Albums Based on Tags and Linked Data . AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0 , 2009 . Yeung, C., A., Kagal, L., Gibbin, N., Shadbolt, N. Providing Access Control to Online Photo Albums Based on Tags and Linked Data. AAAI Spring Symposium on Social Semantic Web: Where Web 2.0 Meets Web 3.0, 2009."},{"key":"e_1_3_2_1_7_1","volume-title":"Uflip: Understanding the energy consumption of flash devices","author":"Bjorling M.","year":"2010","unstructured":"Bjorling , M. , Bonnet , P. , Bouganim , L. , and Jonsson , B. T . 2010 . Uflip: Understanding the energy consumption of flash devices . In IEEE Data Eng. Bull ., 33(4). Bjorling, M., Bonnet, P., Bouganim, L., and Jonsson, B. T. 2010. Uflip: Understanding the energy consumption of flash devices. In IEEE Data Eng. Bull., 33(4)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989327"},{"key":"e_1_3_2_1_9_1","volume-title":"CIDR","author":"Diao Y.","year":"2007","unstructured":"Diao , Y. , Ganesan , D. , Mathur , G. , and Shenoy , P. J . Rethinking data management for storage-centric sensor networks . In CIDR , 2007 . Diao, Y., Ganesan, D., Mathur, G., and Shenoy, P. J. Rethinking data management for storage-centric sensor networks. In CIDR, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36365-8_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646117"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920990"},{"key":"e_1_3_2_1_13_1","volume-title":"Logical Access-Control Framework for Personal File Sharing","author":"Mazurek M., L. A.","year":"2014","unstructured":"Mazurek , M., L. A. Tag-Based , Logical Access-Control Framework for Personal File Sharing . 2014 . PhD thesis. Mazurek, M., L. A. Tag-Based, Logical Access-Control Framework for Personal File Sharing. 2014. PhD thesis."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207728"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79576-6_6"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721695.1721709"},{"key":"e_1_3_2_1_17_1","volume-title":"EDBT","author":"To Q.-C.","year":"2014","unstructured":"To , Q.-C. , Nguyen , B. , and Pucheral , P . Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware . In EDBT , 2014 . To, Q.-C., Nguyen, B., and Pucheral, P. Privacy-Preserving Query Execution using a Decentralized Architecture and Tamper Resistant Hardware. In EDBT, 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070942.2070974"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.145"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275986.1275991"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460428"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387672"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132956.1132959"}],"event":{"name":"SIGMOD\/PODS'15: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Melbourne Victoria Australia","acronym":"SIGMOD\/PODS'15"},"container-title":["Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723372.2735376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2723372.2735376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:58Z","timestamp":1750273438000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2723372.2735376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,27]]},"references-count":23,"alternative-id":["10.1145\/2723372.2735376","10.1145\/2723372"],"URL":"https:\/\/doi.org\/10.1145\/2723372.2735376","relation":{},"subject":[],"published":{"date-parts":[[2015,5,27]]},"assertion":[{"value":"2015-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}