{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T07:10:36Z","timestamp":1726470636885},"reference-count":25,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1016\/j.cose.2009.04.001","type":"journal-article","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T04:49:52Z","timestamp":1240030192000},"page":"698-709","source":"Crossref","is-referenced-by-count":34,"title":["A schema for protecting the integrity of databases"],"prefix":"10.1016","volume":"28","author":[{"given":"Ibrahim","family":"Kamel","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2009.04.001_bib1","article-title":"Hippocratic databases","author":"Agrawal","year":"2002","journal-title":"VLDB"},{"issue":"2","key":"10.1016\/j.cose.2009.04.001_bib2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","article-title":"Watermarking relational data: framework, algorithms and analysis","volume":"12","author":"Agrawal","year":"2003","journal-title":"The VLDB Journal"},{"key":"10.1016\/j.cose.2009.04.001_bib3","unstructured":"Albluwi Q, Kamel Ibrahim. Watermarking essential data structures for copyright Protection. In: The 5th international conference on cryptology ad network security CANS06. Suzhou, Dec. 8\u201310; 2006."},{"key":"10.1016\/j.cose.2009.04.001_bib5","doi-asserted-by":"crossref","DOI":"10.1145\/93605.98741","article-title":"The R*-tree: an efficient and robust access method for points and rectangles","author":"Beckmann","year":"1990","journal-title":"SIGMOD"},{"issue":"2","key":"10.1016\/j.cose.2009.04.001_bib7","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1155\/S1110865702000525","article-title":"Electronic watermarking: the first 50 years","volume":"2002","author":"Cox","year":"2002","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"10.1016\/j.cose.2009.04.001_bib9","first-page":"206","article-title":"Indexing information for data forensics","author":"Goodrich","year":"2005","journal-title":"ACNS"},{"key":"10.1016\/j.cose.2009.04.001_bib10","doi-asserted-by":"crossref","unstructured":"Gross-Amblard D. Query-preserving watermarking of relational databases and XML documents. In: 22nd ACM SIGMOD-SIGACT-SIGART Symp. on principles of database. June 9\u201312; 2003, p. 191\u2013201.","DOI":"10.1145\/773153.773172"},{"issue":"10","key":"10.1016\/j.cose.2009.04.001_bib12","doi-asserted-by":"crossref","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","article-title":"A fragile watermarking scheme for detecting malicious modifications of database relations","volume":"176","author":"Guo","year":"2006","journal-title":"Information Sciences"},{"key":"10.1016\/j.cose.2009.04.001_bib13","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.ins.2006.03.014","article-title":"Chaining watermarks for detecting malicious modifications to streaming data","volume":"177","author":"Guo","year":"2007","journal-title":"Information Sciences"},{"key":"10.1016\/j.cose.2009.04.001_bib14","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/971697.602266","article-title":"R-trees: a dynamic structure for spatial searching","author":"Guttman","year":"1984","journal-title":"ACM SIGMOD"},{"key":"10.1016\/j.cose.2009.04.001_bib15","doi-asserted-by":"crossref","unstructured":"Iyer B, Mehrotra S, Mykletun E, Tsudik G, Wu Y. A framework for efficient storage security in RDBMS. IN: Proc. EDBT; 2004, p.\u00a0147\u201364.","DOI":"10.1007\/978-3-540-24741-8_10"},{"issue":"6","key":"10.1016\/j.cose.2009.04.001_bib20","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.cose.2009.01.007","article-title":"A robust software watermarking for copyright protection","volume":"28","author":"Kamel","year":"2009","journal-title":"Computers & Security"},{"key":"10.1016\/j.cose.2009.04.001_bib18","doi-asserted-by":"crossref","unstructured":"Kamel I, Faloutsos C. On packing R-trees. In: Int. conf. on information and knowledge management (CIKM); Nov 1993.","DOI":"10.1145\/170088.170403"},{"key":"10.1016\/j.cose.2009.04.001_bib19","unstructured":"Kamel I, Faloutsos C. Hilbert, R-tree: an improved r-tree using space filling curve. In: 20th international conference on very large databases VLDB 94. Santiago: Chilep; 1994, p. 500\u201309."},{"key":"10.1016\/j.cose.2009.04.001_bib22","unstructured":"Li Y, Swarup V, Jajodia S. A robust watermarking scheme for relational data. In: Proc. the 13th workshop on information technology and engineering. December 2003, p. 195\u2013200."},{"key":"10.1016\/j.cose.2009.04.001_bib11","doi-asserted-by":"crossref","unstructured":"Li, Guo H, Jajodia S. Tamper detection and localization for categorical data using fragile watermarks. In: The 4th ACM workshop on digital rights management, CCS04; October 2004.","DOI":"10.1145\/1029146.1029159"},{"key":"10.1016\/j.cose.2009.04.001_bib24","series-title":"R-trees: theory and applications","isbn-type":"print","author":"Manolopoulos","year":"2005","ISBN":"http:\/\/id.crossref.org\/isbn\/1852339772"},{"year":"2000","series-title":"A practical method for watermarking java programs","author":"Monden","key":"10.1016\/j.cose.2009.04.001_bib25"},{"key":"10.1016\/j.cose.2009.04.001_bib26","unstructured":"Pang H, Tan K. Authenticating query results in edge computing. In: Proc. of the IEEE Int. Conf. on data engineering; March 2004."},{"key":"10.1016\/j.cose.2009.04.001_bib27","unstructured":"Qin Z, Ying Y, Jia-jin LE, Yi-shu LUO. Watermark based copyright protection of outsourced database. In: 10th international database engineering and applications symposium (IDEAS'06) p. 301\u20138."},{"key":"10.1016\/j.cose.2009.04.001_bib29","doi-asserted-by":"crossref","unstructured":"Sion R, Atallah MJ, Prabhakar SK. Resilient information hiding for abstract semistructures. In: Int. Workshop on Digital Watermarking (IWDW); 2003a.","DOI":"10.1007\/978-3-540-24624-4_11"},{"key":"10.1016\/j.cose.2009.04.001_bib30","doi-asserted-by":"crossref","unstructured":"Sion R, Atallah M, Prabhakar S. Rights protection for relational data. In: Proc. of ACM SIGMOD; 2003b. p. 98\u2013109.","DOI":"10.1145\/872757.872772"},{"year":"2000","series-title":"Definitions, solved and unsolved problems, conjectures, and theorems in number theory and geometry","author":"Smarandache","key":"10.1016\/j.cose.2009.04.001_bib31"},{"issue":"8","key":"10.1016\/j.cose.2009.04.001_bib32","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1016\/j.is.2005.02.002","article-title":"Spatio-temporal join selectivity","volume":"31","author":"Sun","year":"2006","journal-title":"Information Systems"},{"year":"2002","series-title":"Disappearing cryptography","author":"Wayner","key":"10.1016\/j.cose.2009.04.001_bib21"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000297?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000297?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T11:02:48Z","timestamp":1558263768000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404809000297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["S0167404809000297"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.04.001","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}