{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:27:14Z","timestamp":1725629234664},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/icde.2007.367877","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T21:07:32Z","timestamp":1181250452000},"page":"316-325","source":"Crossref","is-referenced-by-count":7,"title":["Invalidation Clues for Database Scalability Services"],"prefix":"10.1109","author":[{"given":"Amit","family":"Manjhi","sequence":"first","affiliation":[]},{"given":"Phillip B.","family":"Gibbons","sequence":"additional","affiliation":[]},{"given":"Anastassia","family":"Ailamaki","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Garrod","sequence":"additional","affiliation":[]},{"given":"Bruce M.","family":"Maggs","sequence":"additional","affiliation":[]},{"given":"Todd C.","family":"Mowry","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Olston","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Tomasic","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1319994"},{"key":"17","article-title":"Efficient execution of aggregation queries over encrypted relational, databases","author":"hacigumus","year":"2004","journal-title":"DASFAA"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50064-4"},{"journal-title":"Trusted Platform Module Main Specification","year":"0","key":"33"},{"key":"15","article-title":"Executing SQL over encrypted data in the database service provider model","author":"hacigumus","year":"2002","journal-title":"Proc SIGMOD"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060313"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1036038"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(95)00035-6"},{"key":"11","article-title":"Certifying program execution with secure processors","author":"chen","year":"2003","journal-title":"USENIX HotOS Workshop"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24655-8_82"},{"key":"21","article-title":"CachePortal II: Acceleration of very large scale data center-hosted database-driven web applications","author":"li","year":"2003","journal-title":"Proc VLDB"},{"key":"20","article-title":"Queries independent of updates","author":"levy","year":"1993","journal-title":"Proc VLDB"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564763"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367877"},{"key":"24","article-title":"Simultaneous scalability and security for dataintensive web applications","author":"manjhi","year":"2006","journal-title":"Proc SIGMOD"},{"year":"0","key":"25"},{"journal-title":"Rice University Bidding System","year":"0","key":"26"},{"journal-title":"Rice University","year":"0","key":"27"},{"key":"28","article-title":"A scalability service for dynamic web applications","author":"olston","year":"2005","journal-title":"Proc CIDR"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/PDIS.1996.568677"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066187"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"10","article-title":"View invalidation for dynamic content caching in multitiered architectures","author":"candan","year":"2002","journal-title":"Proc VLDB"},{"key":"1","article-title":"Two can keep a secret: A distributed architecture for secure database services","author":"aggarwal","year":"2005","journal-title":"Proc CIDR"},{"journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C","year":"1996","author":"schneier","key":"30"},{"journal-title":"Apache Tomcat","year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1088149.1088185"},{"year":"0","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260881"},{"journal-title":"The Washington Post","article-title":"Advertiser charged in massive database theft","year":"2004","key":"31"},{"key":"4","article-title":"Cache tables: Paving the way for an adaptive database cache","author":"altinel","year":"2003","journal-title":"Proc VLDB"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/68012.68015"}],"event":{"name":"2007 IEEE 23rd International Conference on Data Engineering","start":{"date-parts":[[2006,4,15]]},"location":"Istanbul","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 IEEE 23rd International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4221634\/4221635\/04221680.pdf?arnumber=4221680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T02:45:31Z","timestamp":1568688331000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4221680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icde.2007.367877","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}