{"id":"https://openalex.org/W2257711211","doi":"https://doi.org/10.1007/978-3-662-43936-4_21","title":"Towards Secure Cloud Database with Fine-Grained Access Control","display_name":"Towards Secure Cloud Database with Fine-Grained Access Control","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2257711211","doi":"https://doi.org/10.1007/978-3-662-43936-4_21","mag":"2257711211"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-43936-4_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_21","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-43936-4_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-43936-4_21.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107484791","display_name":"Michael G. Solomon","orcid":null},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael G. Solomon","raw_affiliation_strings":["Department of Mathematics & Computer Science, Emory University, Atlanta, USA","Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics & Computer Science, Emory University, Atlanta, USA","institution_ids":["https://openalex.org/I150468666"]},{"raw_affiliation_string":"Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)","institution_ids":["https://openalex.org/I150468666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002623265","display_name":"Vaidy Sunderam","orcid":"https://orcid.org/0000-0002-5128-7852"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vaidy Sunderam","raw_affiliation_strings":["Department of Mathematics & Computer Science, Emory University, Atlanta, USA","Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics & Computer Science, Emory University, Atlanta, USA","institution_ids":["https://openalex.org/I150468666"]},{"raw_affiliation_string":"Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)","institution_ids":["https://openalex.org/I150468666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078394535","display_name":"Li Xiong","orcid":"https://orcid.org/0000-0001-7354-0428"},"institutions":[{"id":"https://openalex.org/I150468666","display_name":"Emory University","ror":"https://ror.org/03czfpz43","country_code":"US","type":"education","lineage":["https://openalex.org/I150468666"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Li Xiong","raw_affiliation_strings":["Department of Mathematics & Computer Science, Emory University, Atlanta, USA","Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)"],"affiliations":[{"raw_affiliation_string":"Department of Mathematics & Computer Science, Emory University, Atlanta, USA","institution_ids":["https://openalex.org/I150468666"]},{"raw_affiliation_string":"Emory University [Atlanta, GA] (201 Dowman Dr, Atlanta, GA 30322 - United States)","institution_ids":["https://openalex.org/I150468666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5107484791"],"corresponding_institution_ids":["https://openalex.org/I150468666"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3619,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.64741185,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"324","last_page":"338"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7419870495796204},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7044945955276489},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6684020757675171},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6342581510543823},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6172231435775757},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.6106856465339661},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.5833994746208191},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5712389945983887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5359564423561096},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.462126225233078},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4518413841724396},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.4432781934738159},{"id":"https://openalex.org/keywords/cloud-database","display_name":"Cloud database","score":0.4280785918235779},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2595342993736267},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11948364973068237},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09706225991249084}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7419870495796204},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7044945955276489},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6684020757675171},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6342581510543823},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6172231435775757},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.6106856465339661},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.5833994746208191},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5712389945983887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5359564423561096},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.462126225233078},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4518413841724396},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.4432781934738159},{"id":"https://openalex.org/C2778974508","wikidata":"https://www.wikidata.org/wiki/Q2499178","display_name":"Cloud database","level":3,"score":0.4280785918235779},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2595342993736267},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11948364973068237},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09706225991249084},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-662-43936-4_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_21","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-43936-4_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.703.8198","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.703.8198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mathcs.emory.edu/aims/pub/solomon14dbsec.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01284867v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01284867","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.324-338, &#x27E8;10.1007/978-3-662-43936-4_21&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-662-43936-4_21","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_21","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-662-43936-4_21.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G13075513","display_name":null,"funder_award_id":"OCI-1124418","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G1523888516","display_name":null,"funder_award_id":"FA9550-","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G3701532825","display_name":null,"funder_award_id":"DDDAS","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G3883116647","display_name":null,"funder_award_id":"FA9550-12-1-0240","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G5809100787","display_name":null,"funder_award_id":"FA9550","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G6050333848","display_name":"Enhancing Cyber-Infrastructure Usability Through Adaptive Middleware","funder_award_id":"1124418","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6071252945","display_name":null,"funder_award_id":"FA9550-12","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G7999580237","display_name":null,"funder_award_id":"FA9550-12-1","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G8124834967","display_name":null,"funder_award_id":"1117763","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2257711211.pdf","grobid_xml":"https://content.openalex.org/works/W2257711211.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W26138792","https://openalex.org/W1411882273","https://openalex.org/W1495266644","https://openalex.org/W1505781329","https://openalex.org/W1547131737","https://openalex.org/W1964344998","https://openalex.org/W1976420017","https://openalex.org/W1988169383","https://openalex.org/W2011353876","https://openalex.org/W2039841452","https://openalex.org/W2040498878","https://openalex.org/W2040916330","https://openalex.org/W2042220809","https://openalex.org/W2066322950","https://openalex.org/W2074416483","https://openalex.org/W2086042811","https://openalex.org/W2108072891","https://openalex.org/W2109867508","https://openalex.org/W2116626915","https://openalex.org/W2118875948","https://openalex.org/W2123019706","https://openalex.org/W2135227684","https://openalex.org/W2138001464","https://openalex.org/W2138716044","https://openalex.org/W2145921607","https://openalex.org/W2152924492","https://openalex.org/W2159915142","https://openalex.org/W2165464232","https://openalex.org/W2165939650","https://openalex.org/W2250570571","https://openalex.org/W2480498986","https://openalex.org/W2492429557","https://openalex.org/W2498130723","https://openalex.org/W2512503597","https://openalex.org/W2604646981","https://openalex.org/W2914756988","https://openalex.org/W4206109607","https://openalex.org/W4232485878","https://openalex.org/W4238625162","https://openalex.org/W4238634196","https://openalex.org/W4255327858","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W200604156","https://openalex.org/W2374784346","https://openalex.org/W3159628342","https://openalex.org/W2105417520"],"abstract_inverted_index":{"Outsourcing":[0],"data":[1,17,28,60,85,102],"to":[2,20,44,81,86,90,92],"cloud":[3,64,93],"environments":[4,94],"can":[5,29,107],"offer":[6],"ease":[7],"of":[8,23],"access,":[9],"provisioning,":[10],"and":[11],"cost":[12],"benefits,":[13],"but":[14,34],"makes":[15],"the":[16,27,53,79],"more":[18],"vulnerable":[19],"disclosure.":[21],"Loss":[22],"complete":[24],"control":[25,77,104],"over":[26,83,105],"be":[30],"offset":[31],"through":[32],"encryption,":[33],"this":[35],"approach":[36],"requires":[37],"an":[38],"omniscient":[39],"third":[40,69],"party":[41,70],"key":[42,46,71],"authority":[43],"handle":[45],"management,":[47],"increasing":[48],"overhead":[49],"complexity.":[50],"We":[51],"present":[52],"ZeroVis":[54],"framework":[55],"that":[56,109],"provides":[57],"confidentiality":[58],"for":[59],"stored":[61],"in":[62],"a":[63,68],"environment":[65],"without":[66],"requiring":[67],"manager.":[72],"It":[73],"combines":[74],"fine-grained":[75],"access":[76],"with":[78,95],"ability":[80],"search":[82],"encrypted":[84],"allow":[87],"existing":[88],"applications":[89],"migrate":[91],"very":[96],"minimal":[97],"software":[98],"changes,":[99],"while":[100],"maintaining":[101],"provider":[103],"who":[106],"consume":[108],"data.":[110]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
