<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An effective and elastic blockchain-based provenance preserving solution for the open data </style></title><secondary-title><style face="normal" font="default" size="100%">International Journal of Web Information Systems</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2021</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Ensuring Correctness, Completeness, and Freshness for Outsourced Tree-Indexed Data</style></title><secondary-title><style face="normal" font="default" size="100%">Information Resources Management: Concepts, Methodologies, Tools and Applications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2010</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><pages><style face="normal" font="default" size="100%"> 693-710</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">43</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security Issues in Outsourced XML Databases</style></title><secondary-title><style face="normal" font="default" size="100%">Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><publisher><style face="normal" font="default" size="100%">IGI Global</style></publisher><pages><style face="normal" font="default" size="100%"> 231-261</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><section><style face="normal" font="default" size="100%">11</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A Novel Solution to Query Assurance Verification for Dynamic Outsourced XML Databases</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of Software</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2008</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">3</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Providing Query Assurance for Outsourced Tree-Indexed Data</style></title><secondary-title><style face="normal" font="default" size="100%">Modeling, Simulation and Optimization of Complex Processes</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2008</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><pub-location><style face="normal" font="default" size="100%">Berlin, Heidelberg</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Query Assurance Verification for Dynamic Outsourced XML Databases</style></title><secondary-title><style face="normal" font="default" size="100%">The Second International Conference on Availability, Reliability and Security (ARES'07)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2007</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10-13 April 2007</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Vienna, Austria </style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">Security Protocols for Outsourcing Database Services</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2006</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2006</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">18</style></volume><pages><style face="normal" font="default" size="100%">85-108</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Advances in networking technologies and the continued growth of the Internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers. As a recent manifestation of this trend, there has been growing interest in outsourcing database services in both the commercial world and the research community. Although the outsourced database service model is emerging as an efficient replacement solution for traditional in-house database management systems, its clients, however, have to store their private data at an external service provider, who is typically not fully trusted, and so it introduces numerous security research challenges. To ensure data confidentiality, the outsourced data is usually encrypted and querying is then carried out with the support of trusted client front-ends or secure coprocessors. Despite a large number of research activities done for securing outsourced databases and removing unencrypted data from exposure to the external server and other intruders, no work has been able to radically secure outsourced databases with associated indexes during the query execution. By exploiting such indexes and with relevant available knowledge, attackers can infer confidential information from the outsourced encrypted data. This article discusses potential attacks in such situations and introduces two security protocols for outsourcing database services. The main contributions focus on solutions to the problem of data privacy/confidentiality and user privacy. The theoretical analyses show that the proposed protocols can effectively protect outsourced data and its associated indexes as well as the clients against various sophisticated attacks.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tran Khanh Dang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy-Preserving Basic Operations on Outsourced Search Trees</style></title><secondary-title><style face="normal" font="default" size="100%">International Workshop on Privacy Data Management – PDM05, in conjunction with ICDE05, IEEE Computer Society</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">April 2005</style></date></pub-dates></dates><pub-location><style face="normal" font="default" size="100%">Tokyo, Japan</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>32</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tran Khanh Dang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Semantic Based Similarity Searches in Database Systems (Multidimensional Access Methods, Similarity Search Algorithms)</style></title><secondary-title><style face="normal" font="default" size="100%">FAW-Institute</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">May 2003</style></date></pub-dates></dates><publisher><style face="normal" font="default" size="100%">University of Linz</style></publisher><pub-location><style face="normal" font="default" size="100%">Austria</style></pub-location><volume><style face="normal" font="default" size="100%">PhD Thesis</style></volume><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>