{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:56:20Z","timestamp":1725706580589},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/icdcsw.2010.35","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:26:37Z","timestamp":1290201997000},"page":"42-51","source":"Crossref","is-referenced-by-count":22,"title":["Encryption-Based Policy Enforcement for Cloud Storage"],"prefix":"10.1109","author":[{"given":"S. De Capitani di","family":"Vimercati","sequence":"first","affiliation":[]},{"given":"S.","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"S.","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"S.","family":"Paraboschi","sequence":"additional","affiliation":[]},{"given":"G.","family":"Pelosi","sequence":"additional","affiliation":[]},{"given":"P.","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proc WPES'08","article-title":"Preserving confidentiality of security policies in data outsourcing","year":"2008","author":"de","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"journal-title":"Proc of SCIS '00","article-title":"Cryptosystems based on pairing","year":"2000","author":"sakai","key":"ref10"},{"journal-title":"Proc USEN1X Security'04","article-title":"TOR: the second-generation onion router","year":"2004","author":"dingledine","key":"ref6"},{"article-title":"The official PCP user's guide","year":"1995","author":"zimmermann","key":"ref11"},{"journal-title":"ACM TODS","article-title":"Encryption Policies for Regulating Access to Outsourced Data","year":"2010","author":"de","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50084-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180441"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1149976.1149977"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102147","article-title":"Dynamic and efficient key management for access hierarchies","author":"atallah","year":"2005","journal-title":"Proc of CCS '05"}],"event":{"name":"2010 30th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops)","start":{"date-parts":[[2010,6,21]]},"location":"Genoa, Italy","end":{"date-parts":[[2010,6,25]]}},"container-title":["2010 IEEE 30th International Conference on Distributed Computing Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5626888\/5628720\/05628734.pdf?arnumber=5628734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:20:21Z","timestamp":1497889221000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5628734\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/icdcsw.2010.35","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}