메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 177-191

Access control friendly query verification for outsourced data publishing

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; NETWORK SECURITY; ONE DIMENSIONAL; QUERY PROCESSING; SECURITY SYSTEMS;

EID: 57049158746     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_12     Document Type: Conference Paper
Times cited : (9)

References (22)
  • 2
    • 0036372525 scopus 로고    scopus 로고
    • Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B.G., Naughton, J.F.: Middle-tier database caching for e-business. In: SIGMOD (2002)
    • Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B.G., Naughton, J.F.: Middle-tier database caching for e-business. In: SIGMOD (2002)
  • 4
    • 33746749406 scopus 로고    scopus 로고
    • Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, pp. 60-73. Springer, Berlin (2006)
    • Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, pp. 60-73. Springer, Berlin (2006)
  • 5
    • 0036204131 scopus 로고    scopus 로고
    • Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: ICDE (2002)
    • Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: ICDE (2002)
  • 6
    • 34250630995 scopus 로고    scopus 로고
    • Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)
    • Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)
  • 7
    • 29844457793 scopus 로고    scopus 로고
    • Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)
    • Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)
  • 8
    • 57049181933 scopus 로고    scopus 로고
    • Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in out-sourced databases. In: NDSS (2004)
    • Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in out-sourced databases. In: NDSS (2004)
  • 9
    • 84964426510 scopus 로고    scopus 로고
    • Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)
    • Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)
  • 10
    • 85084162561 scopus 로고    scopus 로고
    • Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium (January 1998)
    • Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium (January 1998)
  • 13
    • 57049091662 scopus 로고    scopus 로고
    • Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006)
    • Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006)
  • 14
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Pang, H., Tan, K.: Authenticating query results in edge computing. In: ICDE, pp. 560-571 (2004)
    • (2004) ICDE , pp. 560-571
    • Pang, H.1    Tan, K.2
  • 15
    • 57049096494 scopus 로고    scopus 로고
    • Privacy-preserving verification of aggregate queries on outsourced databases
    • Technical Report HPL-2006-128, HP Labs
    • Haber, S., Home, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. Technical Report HPL-2006-128, HP Labs (2006)
    • (2006)
    • Haber, S.1    Home, W.2    Sander, T.3    Yao, D.4
  • 16
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB, pp. 898-909 (2003)
    • (2003) VLDB , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 19
    • 0016353777 scopus 로고
    • Quad trees: A data structure for retrieval on composite keys
    • Finkel, R.A., Bentley, J.L.: Quad trees: a data structure for retrieval on composite keys. Acta Informatica 4(1), 1-9 (1974)
    • (1974) Acta Informatica , vol.4 , Issue.1 , pp. 1-9
    • Finkel, R.A.1    Bentley, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.