{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T20:26:33Z","timestamp":1725481593541},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/smc.2013.344","type":"proceedings-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T17:35:44Z","timestamp":1391189744000},"page":"2007-2012","source":"Crossref","is-referenced-by-count":0,"title":["Data Combination Privacy Preservation Adjusting Mechanism for Software as a Service"],"prefix":"10.1109","author":[{"given":"Zhang","family":"Kun","sequence":"first","affiliation":[]},{"given":"Ajith","family":"Abraham","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Yuliang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.167"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.52"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.02044"},{"key":"13","first-page":"440","article-title":"Keep a few: Outsourcing data while maintaining confidentiality","author":"ciriani","year":"2009","journal-title":"Proceedings of the 14th European Conference on Research in Computer Security"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1805974.1805978"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_12"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_15"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559941"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376736"},{"key":"1","first-page":"514","article-title":"Ruminations on multi-tenant databases","author":"jacobs","year":"2007","journal-title":"BTW"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1145\/1640206.1640208","article-title":"Constructing and testing privacy-aware services in a cloud computing environment: Challenges and opportunities","author":"gu","year":"2009","journal-title":"Proceedings of the First Asia-Pacific Symposium on Internetware"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2009.139"},{"key":"5","article-title":"Towards trusted cloud computing","author":"santos","year":"2009","journal-title":"Proceedings of the 2009 Conference on Hot Topics in Cloud Computing"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559942"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.66"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1621890.1621897"}],"event":{"name":"2013 IEEE International Conference on Systems, Man and Cybernetics (SMC 2013)","start":{"date-parts":[[2013,10,13]]},"location":"Manchester","end":{"date-parts":[[2013,10,16]]}},"container-title":["2013 IEEE International Conference on Systems, Man, and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6689802\/6721750\/06722097.pdf?arnumber=6722097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:05:05Z","timestamp":1498100705000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6722097\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/smc.2013.344","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}