{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T01:05:15Z","timestamp":1648602315116},"reference-count":0,"publisher":"Walter de Gruyter GmbH","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"DOI":"10.1515\/pik-2014-0011","type":"journal-article","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T12:50:56Z","timestamp":1400676656000},"source":"Crossref","is-referenced-by-count":0,"title":["SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service"],"prefix":"10.1515","volume":"37","author":[{"given":"Jens","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"given":"Konrad","family":"J\u00fcnemann","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"374","container-title":["PIK - Praxis der Informationsverarbeitung und Kommunikation"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/pik-2014-0011\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T03:45:55Z","timestamp":1619063155000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/pik-2014-0011\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":0,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1515\/pik-2014-0011","relation":{},"ISSN":["1865-8342","0930-5157"],"issn-type":[{"value":"1865-8342","type":"electronic"},{"value":"0930-5157","type":"print"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}