{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T16:58:55Z","timestamp":1771520335459,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T00:00:00Z","timestamp":1668988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Council for Scientific and Technological Development (CNPq)","award":["303877\/2021-9"],"award-info":[{"award-number":["303877\/2021-9"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,21]]},"DOI":"10.1145\/3569902.3570171","type":"proceedings-article","created":{"date-parts":[[2023,1,17]],"date-time":"2023-01-17T23:41:48Z","timestamp":1673998908000},"page":"95-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Searchable Symmetric Encryption for Private Data Protection in Cloud Environments"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3385-5155","authenticated-orcid":false,"given":"Matheus M.","family":"Silveira","sequence":"first","affiliation":[{"name":"State University of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5963-8012","authenticated-orcid":false,"given":"Danielle S.","family":"Silva","sequence":"additional","affiliation":[{"name":"State University of Ceara (UECE), Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2111-9348","authenticated-orcid":false,"given":"Sandra J. R.","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"Universidad de los Andes, Colombia"}]},{"given":"Rafael L.","family":"Gomes","sequence":"additional","affiliation":[{"name":"State University of Ceara (UECE), Brazil"}]}],"member":"320","published-online":{"date-parts":[[2023,1,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCET54531.2022.9825151"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC51019.2021.9418486"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.004.2100867"},{"key":"e_1_3_2_1_4_1","volume-title":"An Integrated Approach for Data Leaker Detection in Cloud Environment.Journal of Information Science Engineering 36, 5","author":"ISHU","year":"2020","unstructured":"ISHU GUPTA and ASHUTOSH\u00a0KUMAR SINGH. 2020. An Integrated Approach for Data Leaker Detection in Cloud Environment.Journal of Information Science Engineering 36, 5 ( 2020 ), 993 \u2013 1005. ISHU GUPTA and ASHUTOSH\u00a0KUMAR SINGH. 2020. An Integrated Approach for Data Leaker Detection in Cloud Environment.Journal of Information Science Engineering 36, 5 (2020), 993 \u2013 1005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3188110"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761599"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-021-01104-y"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101671"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3103547"}],"event":{"name":"LADC 2022: Latin-American Symposium on Dependable Computing","location":"Fortaleza\/CE Brazil","acronym":"LADC 2022"},"container-title":["Proceedings of the 11th Latin-American Symposium on Dependable Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569902.3570171","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3569902.3570171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:50Z","timestamp":1750183670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3569902.3570171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,21]]},"references-count":10,"alternative-id":["10.1145\/3569902.3570171","10.1145\/3569902"],"URL":"https:\/\/doi.org\/10.1145\/3569902.3570171","relation":{},"subject":[],"published":{"date-parts":[[2022,11,21]]},"assertion":[{"value":"2023-01-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}