메뉴 건너뛰기




Volumn 17, Issue 1, 2009, Pages 101-126

Query assurance verification for outsourced multi-dimensional databases

Author keywords

(reverse) kNN query; Authentic; Complete; Data outsourcing; Minimal; Query assurance

Indexed keywords

(REVERSE) KNN QUERY; AUTHENTIC; COMPLETE; DATA OUTSOURCING; MINIMAL; QUERY ASSURANCE;

EID: 62749198172     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2009-0315     Document Type: Article
Times cited : (29)

References (30)
  • 2
    • 0000758345 scopus 로고
    • Proposed Federal Information Processing Standard for Digital Signature Standard DSS
    • Proposed Federal Information Processing Standard for Digital Signature Standard (DSS), Federal Register 56(169) (1991), 42980-42982.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 3
    • 62749108203 scopus 로고    scopus 로고
    • Secure Hashing Algorithm, National Institute of Science and Technology, FIPS 180-2, 2001.
    • Secure Hashing Algorithm, National Institute of Science and Technology, FIPS 180-2, 2001.
  • 4
    • 0025447750 scopus 로고
    • The R*-tree: An efficient and robust access method for points and rectangles
    • Atlantic City, NJ
    • N. Beckmann, H. Kriegel, R. Schneider and B. Seeger, The R*-tree: An efficient and robust access method for points and rectangles, in: SIGMOD Conference, Atlantic City, NJ, 1990, pp. 322-331.
    • (1990) SIGMOD Conference , pp. 322-331
    • Beckmann, N.1    Kriegel, H.2    Schneider, R.3    Seeger, B.4
  • 5
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Proceedings of Advances in Cryptohgy, EUROCRYPT'03, E. Biham, ed, Springer-Verlag
    • D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and verifiably encrypted signatures from bilinear maps, in: Proceedings of Advances in Cryptohgy - EUROCRYPT'03, E. Biham, ed., LNCS, Springer-Verlag, 2003.
    • (2003) LNCS
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 14
    • 2442588372 scopus 로고    scopus 로고
    • Apps on the edge
    • D. Margulius, Apps on the edge, InfoWorld 24(21) (2002), http://www.infoworld.com/article/02/05/23/020527feedgetci-1.html.
    • (2002) InfoWorld , vol.24 , Issue.21
    • Margulius, D.1
  • 16
    • 62749115023 scopus 로고    scopus 로고
    • R. Merkle, A certified digital signature, in: Proceedings of Advances in Cryptohgy'-Crypto '89, Lecture Notes in Computer Science, 0435, 1999, pp. 218-238.
    • R. Merkle, A certified digital signature, in: Proceedings of Advances in Cryptohgy'-Crypto '89, Lecture Notes in Computer Science, Vol. 0435, 1999, pp. 218-238.
  • 19
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • B. Neuman and T. Tso, Kerberos: An authentication service for computer networks, IEEE Communications Magazine 32(9) (1994), 33-38.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Tso, T.2
  • 21
  • 22
    • 62749143245 scopus 로고    scopus 로고
    • Verifying completeness of relational query answers from, online servers
    • accepted for publication
    • H. Pang and K. Tan, Verifying completeness of relational query answers from, online servers, ACM Transactions on Information and System Security (TISSEC) (2007), accepted for publication.
    • (2007) ACM Transactions on Information and System Security (TISSEC)
    • Pang, H.1    Tan, K.2
  • 24
    • 2442450133 scopus 로고
    • RFC 1321: The MD5 Message-Digest Algorithm
    • R. Rivest, RFC 1321: The MD5 Message-Digest Algorithm, Internet Activities Board, 1992.
    • (1992) Internet Activities Board
    • Rivest, R.1
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 26
    • 34250631783 scopus 로고    scopus 로고
    • Efficient content authentication over distributed hash tables
    • Technical report, Brown University
    • R. Tamassia and N. Triandopoulos, Efficient content authentication over distributed hash tables, Technical report, Brown University, 2005.
    • (2005)
    • Tamassia, R.1    Triandopoulos, N.2
  • 28
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. Sandhu and P. Samarati, Access control: Principles and practice, IEEE Communications Magazine 32(9) (1994), 40-48.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.