{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:09:49Z","timestamp":1773655789131,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905163","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Securing SQL with Access Control for Database as a Service Model"],"prefix":"10.1145","author":[{"given":"Jay","family":"Dave","sequence":"first","affiliation":[{"name":"DA-IICT, Gandhinagar, India"}]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[{"name":"DA-IICT, Gandhinagar, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/876875.879015"},{"key":"e_1_3_2_1_3_1","volume-title":"Computer World","author":"Cooney M.","year":"2009","unstructured":"M. Cooney . IBM touts encryption innovation; new technology performs calculations on encrypted data without decrypting it . Computer World , June 2009 . M. Cooney. IBM touts encryption innovation; new technology performs calculations on encrypted data without decrypting it. Computer World, June 2009."},{"key":"e_1_3_2_1_4_1","first-page":"121","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation, ACM","author":"Li J.","year":"2004","unstructured":"J. Li , M. Krohn , D. Mazi'eres , and D. Shasha . Secure untrusted data repository (SUNDR) . In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM , pp. 121 -- 136 , 2004 . J. Li, M. Krohn, D. Mazi'eres, and D. Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM, pp. 121--136, 2004."},{"key":"e_1_3_2_1_5_1","first-page":"337","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation, ACM","author":"Feldman A. J.","year":"2010","unstructured":"A. J. Feldman , W. P. Zeller , M. J. Freedman , and E. W. Felten . SPORC: Group collaboration using untrusted cloud resources . In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM , pp. 337 -- 350 , 2010 . A. J. Feldman, W. P. Zeller, M. J. Freedman, and E. W. Felten. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM, pp. 337--350, 2010."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535706_24"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275505.1275510"},{"key":"e_1_3_2_1_10_1","first-page":"235","volume-title":"Proceedings of the Conference on Innovative Data Systems Research, CIDR","author":"Curino C.","year":"2011","unstructured":"C. Curino , E. P. C. Jones , R. A. Popa , N. Malviya , E. Wu , S. Madden , H. Balakrishnan , and N. Zeldovich . Relational cloud: A database-as-a-service for the cloud . In Proceedings of the Conference on Innovative Data Systems Research, CIDR , pp. 235 -- 240 , 2011 . C. Curino, E. P. C. Jones, R. A. Popa, N. Malviya, E. Wu, S. Madden, H. Balakrishnan, and N. Zeldovich. Relational cloud: A database-as-a-service for the cloud. In Proceedings of the Conference on Innovative Data Systems Research, CIDR, pp. 235--240, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646290.687060"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813120"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948124"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2006.253189"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007631"},{"key":"e_1_3_2_1_18_1","first-page":"105","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation, ACM","author":"Chlipala A.","year":"2010","unstructured":"A. Chlipala . Static checking of dynamically-varying security policies in database-backed applications . In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM , pp. 105 -- 118 , 2010 . A. Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proceedings of the Symposium on Operating Systems Design and Implementation, ACM, pp. 105--118, 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/50063.214387"},{"key":"e_1_3_2_1_22_1","unstructured":"R. A. Popa C. M. S. Redfield N. Zeldovich and H. Balakrishnan. CryptDB web site. Retrived http:\/\/css.csail.mit.edu\/cryptdb\/  R. A. Popa C. M. S. Redfield N. Zeldovich and H. Balakrishnan. CryptDB web site. Retrived http:\/\/css.csail.mit.edu\/cryptdb\/"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India","acronym":"ICTCS '16"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:49Z","timestamp":1750221529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":22,"alternative-id":["10.1145\/2905055.2905163","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905163","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}