{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,30]],"date-time":"2023-12-30T12:32:54Z","timestamp":1703939574451},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T00:00:00Z","timestamp":1372636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/tcc.2013.18","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:48:13Z","timestamp":1391190493000},"page":"187-200","source":"Crossref","is-referenced-by-count":23,"title":["Integrity for join queries in the cloud"],"prefix":"10.1109","volume":"1","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Paraboschi","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibtcc201302018729","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_24"},{"key":"bibtcc201302018727","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2012.32"},{"key":"bibtcc201302018728","doi-asserted-by":"publisher","DOI":"10.1145\/1103780.1103792"},{"key":"bibtcc201302018711","article-title":"Relational Cloud: A Database Service for the Cloud","author":"curino","year":"2011","journal-title":"Proc Fifth Biennial Conf Innovative Data Systems Research (CIDR '11)"},{"key":"bibtcc201302018710","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.142"},{"key":"bibtcc201302018715","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330337"},{"key":"bibtcc201302018714","doi-asserted-by":"publisher","DOI":"10.1145\/1149976.1149977"},{"key":"bibtcc201302018713","doi-asserted-by":"publisher","DOI":"10.1145\/1735886.1735891"},{"key":"bibtcc201302018712","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807219"},{"key":"bibtcc201302018730","article-title":"Encryption-Based Policy Enforcement for CloudStorage","author":"de capitani di vimercati","year":"2010","journal-title":"Proc First Workshop Security and Privacy in Cloud Computing"},{"key":"bibtcc20130201878","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807231"},{"key":"bibtcc20130201877","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.128"},{"key":"bibtcc20130201879","article-title":"The Transaction Processing Performance Council (Tpc) Benchmark H","year":"2011"},{"key":"bibtcc201302018716","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.14"},{"key":"bibtcc20130201874","article-title":"Integrity Auditing of Outsourced Data","author":"xie","year":"2007","journal-title":"Proc 33rd Int'l Conf Very Large Data Bases (VLDB '07)"},{"key":"bibtcc201302018717","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.24"},{"key":"bibtcc20130201873","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458196"},{"key":"bibtcc201302018718","article-title":"Executing SQL over Encrypted Data in the Database-Service-Provider Model.","author":"hacigms","year":"2002","journal-title":"Proc ACM Int'l Conf Management of Data (SIGMOD '02)"},{"key":"bibtcc20130201876","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.283"},{"key":"bibtcc201302018719","article-title":"Efficient Secure Query Evaluation over Encrypted XML Databases","author":"wang","year":"2006","journal-title":"Proc 32nd Int'l Conf Very Large Data Bases (VLDB '06)"},{"key":"bibtcc20130201875","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559849"},{"key":"bibtcc20130201872","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"bibtcc20130201871","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053289"},{"key":"bibtcc201302018724","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"bibtcc201302018723","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.48"},{"key":"bibtcc201302018726","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566845"},{"key":"bibtcc201302018725","doi-asserted-by":"crossref","DOI":"10.1145\/1755688.1755695","article-title":"Securely Outsourcing Linear Algebra Computations","author":"atallah","year":"2010","journal-title":"Proc Fifth ACM Symp Information Computer and Comm Security (ASIACCS '10)"},{"key":"bibtcc201302018720","article-title":"Ensuring Integrity of Encrypted Databases in the Database-As-A-Service Model","author":"hacigms","year":"2003","journal-title":"Proc IFIP WG11 3 Working Conf Data and Application Security (DBSec '03)"},{"key":"bibtcc201302018722","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142488"},{"key":"bibtcc201302018721","article-title":"Authentic Third-Party Data Publication","author":"devanbu","year":"2000","journal-title":"Proc IFIP WG11 3 Working Conf Data and Application Security (DBSec '03)"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/6731364\/06681865.pdf?arnumber=6681865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:40:52Z","timestamp":1638218452000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681865\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":30,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2013.18","relation":{},"ISSN":["2168-7161"],"issn-type":[{"value":"2168-7161","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7]]}}}