AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2013

AUTHORS

Mohammad Ali Hadavi , Ernesto Damiani , Rasool Jalili , Stelvio Cimato , Zeinab Ganjei

ABSTRACT

Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the “Database As a Service” model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir’s secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly generated pool of shares. In this paper, at first, we customize Shamir’s scheme to have A Searchable Secret Sharing Scheme (AS4) that enables the efficient execution of different kinds of queries over distributed shares. Then, we extend our method for sharing values to A Secure Searchable Secret Sharing Scheme (AS5) to tolerate statistical attacks based on adversary’s knowledge about outsourced data distribution. In AS5 data shares are generated uniformly across a domain to prevent information leakage about the outsourced data. More... »

PAGES

201-216

References to SciGraph publications

  • 2010. Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2005. Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases in DATA AND APPLICATIONS SECURITY XIX
  • 2007. Fragmentation and Encryption to Enforce Privacy in Data Storage in COMPUTER SECURITY – ESORICS 2007
  • 2012. Security Limitations of Using Secret Sharing for Data Outsourcing in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI
  • 2012. k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing in DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI
  • 2007. Design and Analysis of Querying Encrypted Data in Relational Databases in DATA AND APPLICATIONS SECURITY XXI
  • 2009. Keep a Few: Outsourcing Data While Maintaining Confidentiality in COMPUTER SECURITY – ESORICS 2009
  • Book

    TITLE

    Data Privacy Management and Autonomous Spontaneous Security

    ISBN

    978-3-642-35889-0
    978-3-642-35890-6

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-35890-6_15

    DOI

    http://dx.doi.org/10.1007/978-3-642-35890-6_15

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1006250354


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information Systems", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Sharif University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.412553.4", 
              "name": [
                "Data and Network Security Laboratory (DNSL), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hadavi", 
            "givenName": "Mohammad Ali", 
            "id": "sg:person.012306627005.91", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012306627005.91"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Milan", 
              "id": "https://www.grid.ac/institutes/grid.4708.b", 
              "name": [
                "SErvice-oriented Software Architecture Research (SESAR) Lab, Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, Crema, Italy"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Damiani", 
            "givenName": "Ernesto", 
            "id": "sg:person.015713632265.53", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015713632265.53"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Sharif University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.412553.4", 
              "name": [
                "Data and Network Security Laboratory (DNSL), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jalili", 
            "givenName": "Rasool", 
            "id": "sg:person.011275357461.55", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011275357461.55"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Milan", 
              "id": "https://www.grid.ac/institutes/grid.4708.b", 
              "name": [
                "SErvice-oriented Software Architecture Research (SESAR) Lab, Dipartimento di Tecnologie dell\u2019Informazione, Universit\u00e0 degli Studi di Milano, Crema, Italy"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Cimato", 
            "givenName": "Stelvio", 
            "id": "sg:person.010733436721.88", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010733436721.88"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Sharif University of Technology", 
              "id": "https://www.grid.ac/institutes/grid.412553.4", 
              "name": [
                "Data and Network Security Laboratory (DNSL), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Ganjei", 
            "givenName": "Zeinab", 
            "id": "sg:person.011056141013.01", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011056141013.01"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1805974.1805978", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007880669"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948124", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012548067"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-31540-4_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019309232", 
              "https://doi.org/10.1007/978-3-642-31540-4_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535706_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031825914", 
              "https://doi.org/10.1007/11535706_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11535706_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1031825914", 
              "https://doi.org/10.1007/11535706_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/564691.564717", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033627752"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-16825-3_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034865989", 
              "https://doi.org/10.1007/978-3-642-16825-3_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-16825-3_8", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034865989", 
              "https://doi.org/10.1007/978-3-642-16825-3_8"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/359168.359176", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036015253"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73538-0_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037072240", 
              "https://doi.org/10.1007/978-3-540-73538-0_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-73538-0_14", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037072240", 
              "https://doi.org/10.1007/978-3-540-73538-0_14"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74835-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037860934", 
              "https://doi.org/10.1007/978-3-540-74835-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-04444-1_27", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1042229794", 
              "https://doi.org/10.1007/978-3-642-04444-1_27"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-31540-4_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050370608", 
              "https://doi.org/10.1007/978-3-642-31540-4_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/fcst.2007.17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094783045"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/icde.2009.151", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1094801833"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013", 
        "datePublishedReg": "2013-01-01", 
        "description": "Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the \u201cDatabase As a Service\u201d model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir\u2019s secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly generated pool of shares. In this paper, at first, we customize Shamir\u2019s scheme to have A Searchable Secret Sharing Scheme (AS4) that enables the efficient execution of different kinds of queries over distributed shares. Then, we extend our method for sharing values to A Secure Searchable Secret Sharing Scheme (AS5) to tolerate statistical attacks based on adversary\u2019s knowledge about outsourced data distribution. In AS5 data shares are generated uniformly across a domain to prevent information leakage about the outsourced data.", 
        "editor": [
          {
            "familyName": "Di Pietro", 
            "givenName": "Roberto", 
            "type": "Person"
          }, 
          {
            "familyName": "Herranz", 
            "givenName": "Javier", 
            "type": "Person"
          }, 
          {
            "familyName": "Damiani", 
            "givenName": "Ernesto", 
            "type": "Person"
          }, 
          {
            "familyName": "State", 
            "givenName": "Radu", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-35890-6_15", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-642-35889-0", 
            "978-3-642-35890-6"
          ], 
          "name": "Data Privacy Management and Autonomous Spontaneous Security", 
          "type": "Book"
        }, 
        "name": "AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing", 
        "pagination": "201-216", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-35890-6_15"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "1dc5c48c012277377c73648977b3e37bd685b45ad89ceba9cf9db9bf8306f8f3"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1006250354"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-35890-6_15", 
          "https://app.dimensions.ai/details/publication/pub.1006250354"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T23:49", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000246.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-35890-6_15"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35890-6_15'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35890-6_15'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35890-6_15'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-35890-6_15'


     

    This table displays all metadata directly associated to this object as RDF triples.

    157 TRIPLES      23 PREDICATES      40 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-35890-6_15 schema:about anzsrc-for:08
    2 anzsrc-for:0806
    3 schema:author N7c98bf5827724a49b353e73435fa77a6
    4 schema:citation sg:pub.10.1007/11535706_6
    5 sg:pub.10.1007/978-3-540-73538-0_14
    6 sg:pub.10.1007/978-3-540-74835-9_12
    7 sg:pub.10.1007/978-3-642-04444-1_27
    8 sg:pub.10.1007/978-3-642-16825-3_8
    9 sg:pub.10.1007/978-3-642-31540-4_12
    10 sg:pub.10.1007/978-3-642-31540-4_20
    11 https://doi.org/10.1109/fcst.2007.17
    12 https://doi.org/10.1109/icde.2009.151
    13 https://doi.org/10.1145/1805974.1805978
    14 https://doi.org/10.1145/359168.359176
    15 https://doi.org/10.1145/564691.564717
    16 https://doi.org/10.1145/948109.948124
    17 schema:datePublished 2013
    18 schema:datePublishedReg 2013-01-01
    19 schema:description Researchers have been studying security challenges of database outsourcing for almost a decade. Privacy of outsourced data is one of the main challenges when the “Database As a Service” model is adopted in the service oriented trend of the cloud computing paradigm. This is due to the insecurity of the network environment or even the untrustworthiness of the service providers. This paper proposes a method to preserve privacy of outsourced data based on Shamir’s secret sharing scheme. We split attribute values into several parts and distribute them among untrusted servers. The problem of using secret sharing in data outsourcing scenario is how to search efficiently within the randomly generated pool of shares. In this paper, at first, we customize Shamir’s scheme to have A Searchable Secret Sharing Scheme (AS4) that enables the efficient execution of different kinds of queries over distributed shares. Then, we extend our method for sharing values to A Secure Searchable Secret Sharing Scheme (AS5) to tolerate statistical attacks based on adversary’s knowledge about outsourced data distribution. In AS5 data shares are generated uniformly across a domain to prevent information leakage about the outsourced data.
    20 schema:editor N6bf12e8221b34080b0bd110a1f9be4a0
    21 schema:genre chapter
    22 schema:inLanguage en
    23 schema:isAccessibleForFree false
    24 schema:isPartOf Nb7d54bb600704956804d77bd5fdc4f1d
    25 schema:name AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing
    26 schema:pagination 201-216
    27 schema:productId N2e4ff21c5a53454c8a63177c52ae1453
    28 N5ae6cc09d3fe49cf922243a8214dd6fc
    29 N83fd00d9ac4f45ac8cac305d69d4107d
    30 schema:publisher N7a95a69b2f984ec7b5f5706e5bb8c1d9
    31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006250354
    32 https://doi.org/10.1007/978-3-642-35890-6_15
    33 schema:sdDatePublished 2019-04-15T23:49
    34 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    35 schema:sdPublisher N49756de6bc044fe4ae77263f80acb822
    36 schema:url http://link.springer.com/10.1007/978-3-642-35890-6_15
    37 sgo:license sg:explorer/license/
    38 sgo:sdDataset chapters
    39 rdf:type schema:Chapter
    40 N0322f23c8f454d4bbd75d6cd14db9504 schema:familyName Damiani
    41 schema:givenName Ernesto
    42 rdf:type schema:Person
    43 N2bd3fdb3b6b94544a3b65616dbea265d schema:familyName State
    44 schema:givenName Radu
    45 rdf:type schema:Person
    46 N2e4ff21c5a53454c8a63177c52ae1453 schema:name doi
    47 schema:value 10.1007/978-3-642-35890-6_15
    48 rdf:type schema:PropertyValue
    49 N35d165abc6234cc2b1fbc9cf297a74aa schema:familyName Di Pietro
    50 schema:givenName Roberto
    51 rdf:type schema:Person
    52 N49756de6bc044fe4ae77263f80acb822 schema:name Springer Nature - SN SciGraph project
    53 rdf:type schema:Organization
    54 N55ff227c83a04706a2caa38f98db80d5 rdf:first sg:person.011056141013.01
    55 rdf:rest rdf:nil
    56 N5ae6cc09d3fe49cf922243a8214dd6fc schema:name readcube_id
    57 schema:value 1dc5c48c012277377c73648977b3e37bd685b45ad89ceba9cf9db9bf8306f8f3
    58 rdf:type schema:PropertyValue
    59 N666b9cd775e44e91813ded1b98912f8f rdf:first Nc5f45ddc89794e2a8e6fe41c08881924
    60 rdf:rest N9745ab35712e48e3b2de2a929523bbbf
    61 N6bf12e8221b34080b0bd110a1f9be4a0 rdf:first N35d165abc6234cc2b1fbc9cf297a74aa
    62 rdf:rest N666b9cd775e44e91813ded1b98912f8f
    63 N70c8fd1543e74eddb5d0386deea712b2 rdf:first sg:person.011275357461.55
    64 rdf:rest Nd27362a12ff94ab28bd12857858d09bf
    65 N7a95a69b2f984ec7b5f5706e5bb8c1d9 schema:location Berlin, Heidelberg
    66 schema:name Springer Berlin Heidelberg
    67 rdf:type schema:Organisation
    68 N7c98bf5827724a49b353e73435fa77a6 rdf:first sg:person.012306627005.91
    69 rdf:rest Ne9a466dc25bf4eaab88706269b4bd091
    70 N83fd00d9ac4f45ac8cac305d69d4107d schema:name dimensions_id
    71 schema:value pub.1006250354
    72 rdf:type schema:PropertyValue
    73 N8b50e0b13158408b94fa5aa3a378d203 rdf:first N2bd3fdb3b6b94544a3b65616dbea265d
    74 rdf:rest rdf:nil
    75 N9745ab35712e48e3b2de2a929523bbbf rdf:first N0322f23c8f454d4bbd75d6cd14db9504
    76 rdf:rest N8b50e0b13158408b94fa5aa3a378d203
    77 Nb7d54bb600704956804d77bd5fdc4f1d schema:isbn 978-3-642-35889-0
    78 978-3-642-35890-6
    79 schema:name Data Privacy Management and Autonomous Spontaneous Security
    80 rdf:type schema:Book
    81 Nc5f45ddc89794e2a8e6fe41c08881924 schema:familyName Herranz
    82 schema:givenName Javier
    83 rdf:type schema:Person
    84 Nd27362a12ff94ab28bd12857858d09bf rdf:first sg:person.010733436721.88
    85 rdf:rest N55ff227c83a04706a2caa38f98db80d5
    86 Ne9a466dc25bf4eaab88706269b4bd091 rdf:first sg:person.015713632265.53
    87 rdf:rest N70c8fd1543e74eddb5d0386deea712b2
    88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    89 schema:name Information and Computing Sciences
    90 rdf:type schema:DefinedTerm
    91 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
    92 schema:name Information Systems
    93 rdf:type schema:DefinedTerm
    94 sg:person.010733436721.88 schema:affiliation https://www.grid.ac/institutes/grid.4708.b
    95 schema:familyName Cimato
    96 schema:givenName Stelvio
    97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010733436721.88
    98 rdf:type schema:Person
    99 sg:person.011056141013.01 schema:affiliation https://www.grid.ac/institutes/grid.412553.4
    100 schema:familyName Ganjei
    101 schema:givenName Zeinab
    102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011056141013.01
    103 rdf:type schema:Person
    104 sg:person.011275357461.55 schema:affiliation https://www.grid.ac/institutes/grid.412553.4
    105 schema:familyName Jalili
    106 schema:givenName Rasool
    107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011275357461.55
    108 rdf:type schema:Person
    109 sg:person.012306627005.91 schema:affiliation https://www.grid.ac/institutes/grid.412553.4
    110 schema:familyName Hadavi
    111 schema:givenName Mohammad Ali
    112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012306627005.91
    113 rdf:type schema:Person
    114 sg:person.015713632265.53 schema:affiliation https://www.grid.ac/institutes/grid.4708.b
    115 schema:familyName Damiani
    116 schema:givenName Ernesto
    117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015713632265.53
    118 rdf:type schema:Person
    119 sg:pub.10.1007/11535706_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1031825914
    120 https://doi.org/10.1007/11535706_6
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/978-3-540-73538-0_14 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037072240
    123 https://doi.org/10.1007/978-3-540-73538-0_14
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/978-3-540-74835-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037860934
    126 https://doi.org/10.1007/978-3-540-74835-9_12
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/978-3-642-04444-1_27 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042229794
    129 https://doi.org/10.1007/978-3-642-04444-1_27
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-642-16825-3_8 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034865989
    132 https://doi.org/10.1007/978-3-642-16825-3_8
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/978-3-642-31540-4_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019309232
    135 https://doi.org/10.1007/978-3-642-31540-4_12
    136 rdf:type schema:CreativeWork
    137 sg:pub.10.1007/978-3-642-31540-4_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050370608
    138 https://doi.org/10.1007/978-3-642-31540-4_20
    139 rdf:type schema:CreativeWork
    140 https://doi.org/10.1109/fcst.2007.17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094783045
    141 rdf:type schema:CreativeWork
    142 https://doi.org/10.1109/icde.2009.151 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094801833
    143 rdf:type schema:CreativeWork
    144 https://doi.org/10.1145/1805974.1805978 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007880669
    145 rdf:type schema:CreativeWork
    146 https://doi.org/10.1145/359168.359176 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036015253
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/564691.564717 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033627752
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/948109.948124 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012548067
    151 rdf:type schema:CreativeWork
    152 https://www.grid.ac/institutes/grid.412553.4 schema:alternateName Sharif University of Technology
    153 schema:name Data and Network Security Laboratory (DNSL), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran
    154 rdf:type schema:Organization
    155 https://www.grid.ac/institutes/grid.4708.b schema:alternateName University of Milan
    156 schema:name SErvice-oriented Software Architecture Research (SESAR) Lab, Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Crema, Italy
    157 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...