-
1
-
-
0038274733
-
Authentic data publication over the internet
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic data publication over the internet. Journal of Computer Security 11, 291-314 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
2
-
-
0036372525
-
-
Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B.G., Naughton, J.F.: Middle-tier database caching for e-business. In: SIGMOD (2002)
-
Luo, Q., Krishnamurthy, S., Mohan, C., Pirahesh, H., Woo, H., Lindsay, B.G., Naughton, J.F.: Middle-tier database caching for e-business. In: SIGMOD (2002)
-
-
-
-
3
-
-
84978370407
-
An analysis of internet content delivery systems. SIGOPS
-
Saroiu, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of internet content delivery systems. SIGOPS Oper. Syst. Rev. 36(SI) (2002)
-
(2002)
Oper. Syst. Rev
, vol.36
, Issue.SI
-
-
Saroiu, S.1
Gummadi, K.P.2
Dunn, R.J.3
Gribble, S.D.4
Levy, H.M.5
-
4
-
-
33746749406
-
-
Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, pp. 60-73. Springer, Berlin (2006)
-
Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, pp. 60-73. Springer, Berlin (2006)
-
-
-
-
5
-
-
0036204131
-
-
Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: ICDE (2002)
-
Hacigumus, H., Iyer, B.R., Mehrotra, S.: Providing database as a service. In: ICDE (2002)
-
-
-
-
6
-
-
34250630995
-
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: SIGMOD (2006)
-
-
-
-
7
-
-
29844457793
-
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD (2005)
-
-
-
-
8
-
-
57049181933
-
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in out-sourced databases. In: NDSS (2004)
-
Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in out-sourced databases. In: NDSS (2004)
-
-
-
-
9
-
-
84964426510
-
-
Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)
-
Goodrich, M., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: DISCEX II (2001)
-
-
-
-
10
-
-
85084162561
-
-
Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium (January 1998)
-
Naor, M., Nissim, K.: Certificate revocation and certificate update. In: Proceedings of the 7th USENIX Security Symposium (January 1998)
-
-
-
-
12
-
-
0038223814
-
-
Martel, C., Nuckolls, G., Devanbu, P., Gertz, M., Kwong, A., Stubblebine, S.: A general model for authenticated data structures (2001)
-
(2001)
A general model for authenticated data structures
-
-
Martel, C.1
Nuckolls, G.2
Devanbu, P.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.6
-
13
-
-
57049091662
-
-
Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006)
-
Cheng, W., Pang, H., Tan, K.L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006)
-
-
-
-
14
-
-
2442590644
-
Authenticating query results in edge computing
-
Pang, H., Tan, K.: Authenticating query results in edge computing. In: ICDE, pp. 560-571 (2004)
-
(2004)
ICDE
, pp. 560-571
-
-
Pang, H.1
Tan, K.2
-
15
-
-
57049096494
-
Privacy-preserving verification of aggregate queries on outsourced databases
-
Technical Report HPL-2006-128, HP Labs
-
Haber, S., Home, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. Technical Report HPL-2006-128, HP Labs (2006)
-
(2006)
-
-
Haber, S.1
Home, W.2
Sander, T.3
Yao, D.4
-
16
-
-
85009120801
-
Controlling access to published data using cryptography
-
Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB, pp. 898-909 (2003)
-
(2003)
VLDB
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
17
-
-
13844271963
-
Selective and authentic third-party distribution of xml documents
-
Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and authentic third-party distribution of xml documents. IEEE Transactions on Knowledge and Data Engineering 16(10), 1263-1278 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.4
Gupta, A.5
-
18
-
-
33745801618
-
Securing xml data in third-party distribution systems
-
ACM, New York
-
Carminati, B., Ferrari, E., Bertino, E.: Securing xml data in third-party distribution systems. In: CIKM 2005: Proceedings of the 14th ACM international conference on Information and knowledge management, pp. 99-106. ACM, New York (2005)
-
(2005)
CIKM 2005: Proceedings of the 14th ACM international conference on Information and knowledge management
, pp. 99-106
-
-
Carminati, B.1
Ferrari, E.2
Bertino, E.3
-
19
-
-
0016353777
-
Quad trees: A data structure for retrieval on composite keys
-
Finkel, R.A., Bentley, J.L.: Quad trees: a data structure for retrieval on composite keys. Acta Informatica 4(1), 1-9 (1974)
-
(1974)
Acta Informatica
, vol.4
, Issue.1
, pp. 1-9
-
-
Finkel, R.A.1
Bentley, J.L.2
-
22
-
-
0026923108
-
Dynamic algorithms in computational geometry
-
Chiang, Y., Tamassia, R.: Dynamic algorithms in computational geometry. Proceedings of IEEE, Special Issue on Computational Geometry 80(9), 362-381 (1992)
-
(1992)
Proceedings of IEEE, Special Issue on Computational Geometry
, vol.80
, Issue.9
, pp. 362-381
-
-
Chiang, Y.1
Tamassia, R.2
|