{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:44Z","timestamp":1725472004029},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540467885"},{"type":"electronic","value":"9783540467908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11896548_21","type":"book-chapter","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T06:02:49Z","timestamp":1161151369000},"page":"234-249","source":"Crossref","is-referenced-by-count":3,"title":["Confidentiality Enforcement for XML Outsourced Data"],"prefix":"10.1007","author":[{"given":"Barbara","family":"Carminati","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ferrari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"10","key":"21_CR1","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2004.63","volume":"16","author":"E. Bertino","year":"2004","unstructured":"Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (TKDE)\u00a016(10), 1263\u20131278 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering (TKDE)"},{"issue":"3","key":"21_CR2","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1145\/545186.545190","volume":"5","author":"E. Bertino","year":"2002","unstructured":"Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security (TISSEC)\u00a05(3), 290\u2013331 (2002)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"doi-asserted-by":"crossref","unstructured":"Bertino, E., Carminati, B., Ferrari, E.: A Temporal Key Management Scheme for Broadcasting XML Documents. In: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 2002), Washington (November 2002)","key":"21_CR3","DOI":"10.1145\/586110.586116"},{"doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Bertino, E.: Securing XML Data in Third-Party Distribution Systems. In: Proc. of the ACM Fourteenth Conference on Information and Knowledge Management (CIKM 2005), Bremen, Germany (November 2005)","key":"21_CR4","DOI":"10.1145\/1099554.1099575"},{"issue":"4","key":"21_CR5","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s10207-003-0020-x","volume":"1","author":"B. Carminati","year":"2003","unstructured":"Carminati, B., Ferrari, E.: Management of Access Control Policies for XML Document Sources. International Journal of Information Security\u00a01(4), 236\u2013260 (2003)","journal-title":"International Journal of Information Security"},{"doi-asserted-by":"crossref","unstructured":"Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over Encrypted Data in the Database Service Provider Model. In: Proc. of the ACM SIGMOD 2002, Madison, WI, USA (June 2002)","key":"21_CR6","DOI":"10.1145\/564691.564717"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-540-24571-1_10","volume-title":"Database Systems for Advanced Applications","author":"H. Hac\u0131g\u00fcm\u00fc\u015f","year":"2004","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B.R., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 125\u2013136. Springer, Heidelberg (2004)"},{"key":"21_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A Certified Digital Signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"21_CR9","volume-title":"Introduction to Modern Information Retrival","author":"G. Salton","year":"1983","unstructured":"Salton, G., McGill, M.: Introduction to Modern Information Retrival. McGraw-Hill, New York (1983)"},{"unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, California (2000)","key":"21_CR10"},{"unstructured":"World Wide Web Consortium, \n \n http:\/\/www.w3.org","key":"21_CR11"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Database Technology \u2013 EDBT 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11896548_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:36:42Z","timestamp":1619509002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11896548_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540467885","9783540467908"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11896548_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}