{"id":"https://openalex.org/W2160778412","doi":"https://doi.org/10.1109/cbms.2010.6042644","title":"Experimental evaluation of query processing on encrypted Telemedicine data","display_name":"Experimental evaluation of query processing on encrypted Telemedicine data","publication_year":2010,"publication_date":"2010-10-01","ids":{"openalex":"https://openalex.org/W2160778412","doi":"https://doi.org/10.1109/cbms.2010.6042644","mag":"2160778412"},"language":"en","primary_location":{"id":"doi:10.1109/cbms.2010.6042644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cbms.2010.6042644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE 23rd International Symposium on Computer-Based Medical Systems (CBMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101756436","display_name":"Ling Feng","orcid":"https://orcid.org/0000-0001-7378-4342"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ling Feng","raw_affiliation_strings":["Department of Computer Science and Technology, Tsinghua University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5101756436"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.14964022,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"215","last_page":"220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8719573020935059},{"id":"https://openalex.org/keywords/xpath","display_name":"XPath","score":0.6658263802528381},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6522682309150696},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5899461507797241},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.5716204047203064},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.5708940029144287},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.5142692923545837},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4957176446914673},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.47382912039756775},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.46351444721221924},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4632056951522827},{"id":"https://openalex.org/keywords/xml-framework","display_name":"XML framework","score":0.439129501581192},{"id":"https://openalex.org/keywords/query-language","display_name":"Query language","score":0.428283154964447},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.3953983783721924},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2373352348804474},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21363210678100586}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8719573020935059},{"id":"https://openalex.org/C2780213375","wikidata":"https://www.wikidata.org/wiki/Q16340","display_name":"XPath","level":4,"score":0.6658263802528381},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6522682309150696},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5899461507797241},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.5716204047203064},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.5708940029144287},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.5142692923545837},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4957176446914673},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.47382912039756775},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.46351444721221924},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4632056951522827},{"id":"https://openalex.org/C21761406","wikidata":"https://www.wikidata.org/wiki/Q8042330","display_name":"XML framework","level":3,"score":0.439129501581192},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.428283154964447},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.3953983783721924},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2373352348804474},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21363210678100586}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cbms.2010.6042644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cbms.2010.6042644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 IEEE 23rd International Symposium on Computer-Based Medical Systems (CBMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1522905818","https://openalex.org/W2043508455","https://openalex.org/W2147929033","https://openalex.org/W2171027248","https://openalex.org/W4242080281","https://openalex.org/W6631198743","https://openalex.org/W6682311248"],"related_works":["https://openalex.org/W2122772764","https://openalex.org/W2361056328","https://openalex.org/W1508598635","https://openalex.org/W2223338945","https://openalex.org/W2098427549","https://openalex.org/W2552861811","https://openalex.org/W2097432289","https://openalex.org/W2134220710","https://openalex.org/W2769038488","https://openalex.org/W2944186186"],"abstract_inverted_index":{"While":[0],"Telemedicine":[1,63,130,228],"technology":[2],"greatly":[3],"increases":[4],"the":[5,26,77,80,91,97,109,166,212],"quality":[6],"of":[7,28,47,49,100,112,170,200,223],"medical":[8,84,102],"care":[9,13],"with":[10,162],"less":[11],"health":[12],"costs,":[14],"it":[15],"also":[16],"raises":[17],"critical":[18],"challenges":[19],"for":[20,181,211],"data":[21,29,31,64,85,103,121,131,161,180],"security":[22,50],"and":[23,37,67,119,124,134,168,174,183,208],"privacy":[24],"in":[25,70,117],"course":[27],"entry,":[30],"review,":[32],"patient":[33],"education,":[34],"video":[35],"conference,":[36],"electronic":[38],"monitoring.":[39],"To":[40],"meet":[41],"these":[42,191],"various":[43],"needs,":[44],"a":[45,219],"number":[46],"different":[48],"strategies":[51],"can":[52,104],"be":[53,106],"utilized.":[54],"In":[55,137],"this":[56],"study,":[57],"we":[58,139],"aim":[59],"to":[60,145,157],"secure":[61,83],"user-related":[62],"by":[65,186],"storing":[66],"distributing":[68],"them":[69],"an":[71,141],"encrypted":[72,101,128,150,159,226],"form,":[73],"so":[74],"that":[75],"on":[76,82,90],"one":[78],"hand":[79,93],"requirement":[81],"management":[86],"is":[87,156,196],"satisfied,":[88],"while":[89],"other":[92],"efficient":[94,98,147],"processing,":[95],"particularly":[96],"querying":[99,126,148,224],"still":[105],"guaranteed.":[107],"Given":[108],"increasing":[110],"use":[111],"eXtensible":[113],"Markup":[114],"Language":[115],"(XML)":[116],"describing":[118],"interchanging":[120],"between":[122],"systems":[123],"users,":[125],"over":[127,149,225],"XML":[129,151,160,172,179],"becomes":[132],"more":[133,135],"important.":[136],"[3],":[138],"develop":[140],"effective":[142],"hash-based":[143],"approach":[144],"enable":[146],"data.":[152,229],"The":[153],"basic":[154],"idea":[155],"augment":[158],"encodings":[163],"which":[164,198],"characterize":[165],"topology":[167],"content":[169],"tree-structured":[171],"data,":[173],"then":[175],"filter":[176],"out":[177],"candidate":[178],"decryption":[182],"query":[184],"execution":[185],"examining":[187],"XPath":[188],"queries":[189],"against":[190],"encodings.":[192],"A":[193],"generic":[194],"framework":[195],"provided":[197],"consists":[199],"three":[201],"phases,":[202],"namely,":[203],"\u201cquery":[204,206,209],"preparation\u201d,":[205],"pre-processing\u201d":[207],"execution\u201d,":[210],"proposed":[213],"search":[214],"strategy.":[215],"This":[216],"paper":[217],"presents":[218],"comprehensive":[220],"experimental":[221],"evaluation":[222],"XML-formated":[227]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
