{"id":"https://openalex.org/W2030507916","doi":"https://doi.org/10.1515/pik-2014-0011","title":"SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service","display_name":"SECURUS: Composition of Confidentiality Preserving Indexing Approaches for Secure Database-as-a-Service","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2030507916","doi":"https://doi.org/10.1515/pik-2014-0011","mag":"2030507916"},"language":"de","primary_location":{"id":"doi:10.1515/pik-2014-0011","is_oa":false,"landing_page_url":"https://doi.org/10.1515/pik-2014-0011","pdf_url":null,"source":{"id":"https://openalex.org/S4210217175","display_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","issn_l":"0930-5157","issn":["0930-5157","1865-8342"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041315652","display_name":"Jens K\u00f6hler","orcid":"https://orcid.org/0000-0003-3874-8412"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jens K\u00f6hler","raw_affiliation_strings":["Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028098541","display_name":"Konrad J\u00fcnemann","orcid":null},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Konrad J\u00fcnemann","raw_affiliation_strings":["Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085339318","display_name":"Hannes Hartenstein","orcid":"https://orcid.org/0000-0003-3441-3180"},"institutions":[{"id":"https://openalex.org/I102335020","display_name":"Karlsruhe Institute of Technology","ror":"https://ror.org/04t3en479","country_code":"DE","type":"education","lineage":["https://openalex.org/I102335020","https://openalex.org/I1305996414"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Hannes Hartenstein","raw_affiliation_strings":["Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany"],"affiliations":[{"raw_affiliation_string":"Karlsruhe Institute of Technology (KIT) \u2013 Steinbuch Centre for Computing (SCC), Karlsruhe, Germany","institution_ids":["https://openalex.org/I102335020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5041315652"],"corresponding_institution_ids":["https://openalex.org/I102335020"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07891385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"37","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8423911929130554},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6174684762954712},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5661129355430603},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5593558549880981},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.5073160529136658},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.45367854833602905},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4232315123081207},{"id":"https://openalex.org/keywords/database-administrator","display_name":"Database administrator","score":0.4225200116634369},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.41468170285224915},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3162451386451721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23961478471755981}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8423911929130554},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6174684762954712},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5661129355430603},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5593558549880981},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.5073160529136658},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.45367854833602905},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4232315123081207},{"id":"https://openalex.org/C70236469","wikidata":"https://www.wikidata.org/wiki/Q1078262","display_name":"Database administrator","level":2,"score":0.4225200116634369},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.41468170285224915},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3162451386451721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23961478471755981},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1515/pik-2014-0011","is_oa":false,"landing_page_url":"https://doi.org/10.1515/pik-2014-0011","pdf_url":null,"source":{"id":"https://openalex.org/S4210217175","display_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","issn_l":"0930-5157","issn":["0930-5157","1865-8342"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PIK - Praxis der Informationsverarbeitung und Kommunikation","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2382515644","https://openalex.org/W1930396972"],"abstract_inverted_index":{"The":[0],"Database-as-a-Service":[1],"(DaaS)":[2],"paradigm":[3],"addresses":[4],"the":[5,26,33,57,69,84,102,117,120,131,141,164,177],"outsourcing":[6],"of":[7,71,74,86,98,130,160],"databases":[8],"to":[9,24,40,59,90,143,184],"specialized":[10],"storage":[11,27],"providers,":[12],"potentially":[13],"reducing":[14],"costs":[15],"and":[16,119,148,180,187],"increasing":[17],"robustness.":[18],"A":[19],"common":[20],"DaaS":[21],"requirement":[22],"is":[23,106,173],"prevent":[25],"provider":[28],"from":[29,32],"retrieving":[30],"information":[31],"outsourced":[34],"data":[35],"while":[36,55],"still":[37],"allowing":[38,56],"it":[39,111],"execute":[41],"queries.":[42],"Various":[43],"confidentiality":[44,54,146],"preserving":[45],"indexing":[46],"approaches":[47,66],"(CPIs)":[48],"have":[49],"been":[50],"proposed":[51],"that":[52,79,100,135,162,175],"preserve":[53],"SP":[58],"participate":[60],"in":[61,151],"query":[62,149,188],"execution.":[63],"However,":[64],"these":[65],"only":[67],"allow":[68],"execution":[70],"specific":[72,104],"kinds":[73],"queries,":[75],"for":[76],"instance":[77],"queries":[78],"select":[80],"records":[81],"based":[82],"on":[83],"equality":[85],"a":[87,91,107,152,158,168],"certain":[88],"attribute":[89],"search":[92],"term.":[93],"Choosing":[94],"an":[95,128],"optimal":[96],"set":[97,159],"CPIs":[99,161,179],"matches":[101,163],"user\u2019s":[103],"requirements":[105],"hard":[108],"task,":[109],"as":[110],"requires":[112],"expert":[113],"knowledge":[114],"about":[115],"both":[116],"scenario":[118],"available":[121],"CPIs.":[122],"In":[123],"this":[124,137],"article,":[125],"we":[126],"provide":[127],"overview":[129],"Securus":[132,139,155],"framework":[133],"[10]":[134],"tackles":[136],"issue.":[138],"allows":[140],"user":[142],"define":[144],"her":[145],"needs":[147],"workload":[150],"Policy":[153],"Profile.":[154],"then":[156],"computes":[157],"specified":[165],"requirements.":[166],"Furthermore,":[167],"software":[169],"adapter":[170],"called":[171],"Mediator":[172],"generated":[174],"implements":[176],"chosen":[178],"can":[181],"be":[182],"used":[183],"seamlessly":[185],"outsource":[186],"data.":[189]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
