메뉴 건너뛰기




Volumn 1, Issue 1, 2008, Pages 126-137

Authenticating the query results of text search engines

Author keywords

[No Author keywords available]

Indexed keywords

WEB CRAWLER;

EID: 76849102606     PISSN: None     EISSN: 21508097     Source Type: Conference Proceeding    
DOI: 10.14778/1453856.1453875     Document Type: Article
Times cited : (72)

References (32)
  • 3
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In EUROCRYPT, pages 416-432, 2003.
    • (2003) EUROCRYPT , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 4
    • 0038589165 scopus 로고    scopus 로고
    • The Anatomy of a Large-Scale Hypertextual Web Search Engine
    • S. Brin and L. Page. The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks and ISDN Systems, 30(1-7):107-117, 1998.
    • (1998) Computer Networks and ISDN Systems , vol.30 , Issue.1-7 , pp. 107-117
    • Brin, S.1    Page, L.2
  • 5
    • 33746749406 scopus 로고    scopus 로고
    • Authenticating Multi-Dimensional Query Results in Data Publishing
    • July
    • W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-Dimensional Query Results in Data Publishing. In DBSec, pages 60-73, July 2006.
    • (2006) DBSec , pp. 60-73
    • Cheng, W.1    Pang, H.2    Tan, K.-L.3
  • 6
    • 84859205683 scopus 로고    scopus 로고
    • Query Assurance Verification for Outsourced Multi-dimensional Databases
    • W. Cheng and K.-L. Tan. Query Assurance Verification for Outsourced Multi-dimensional Databases. Journal of Computer Security, 2008.
    • (2008) Journal of Computer Security
    • Cheng, W.1    Tan, K.-L.2
  • 7
    • 0018480749 scopus 로고
    • Ubiquitous B-Tree
    • D. Comer. Ubiquitous B-Tree. ACM Computing Surveys, 11(2):121-137, 1979.
    • (1979) ACM Computing Surveys , vol.11 , Issue.2 , pp. 121-137
    • Comer, D.1
  • 9
    • 0000758345 scopus 로고
    • Proposed Federal Information Processing Standard for Digital Signature Standard
    • DSS
    • DSS. Proposed Federal Information Processing Standard for Digital Signature Standard. Federal Register, 56(169):42980-42982, 1991.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 11
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative Sources in a Hyperlinked Environment
    • J. M. Kleinberg. Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5):604-632, 1999.
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.M.1
  • 13
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic Authenticated Index Structures for Outsourced Databases
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In ACM SIGMOD, pages 121-132, 2006.
    • (2006) ACM SIGMOD , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 14
    • 85011031975 scopus 로고    scopus 로고
    • Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams
    • F. Li, K. Yi, M. Hadjieleftheriou, and G. Kollios. Proof-Infused Streams: Enabling Authentication of Sliding Window Queries on Streams. In VLDB, pages 147-158, 2007.
    • (2007) VLDB , pp. 147-158
    • Li, F.1    Yi, K.2    Hadjieleftheriou, M.3    Kollios, G.4
  • 15
    • 85038452936 scopus 로고    scopus 로고
    • Lucene. Apache Lucene Search Engine
    • Lucene. Apache Lucene Search Engine. http://lucene.apache.org/java/docs/.
  • 17
    • 84969346266 scopus 로고
    • A Certified Digital Signature
    • R. Merkle. A Certified Digital Signature. In Crypto, pages 218-238, 1989.
    • (1989) Crypto , pp. 218-238
    • Merkle, R.1
  • 18
    • 33745798432 scopus 로고    scopus 로고
    • DSAC: Integrity for Outsourced Databases with Signature Aggregation and Chaining
    • M. Narasimha and G. Tsudik. DSAC: Integrity for Outsourced Databases with Signature Aggregation and Chaining. In CIKM, pages 235-236, 2005.
    • (2005) CIKM , pp. 235-236
    • Narasimha, M.1    Tsudik, G.2
  • 19
    • 29844457793 scopus 로고    scopus 로고
    • Verifying Completeness of Relational Query Results in Data Publishing
    • H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In ACM SIGMOD, pages 407-418, 2005.
    • (2005) ACM SIGMOD , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 20
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating Query Results in Edge Computing
    • H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In IEEE ICDE, pages 560-571, 2004.
    • (2004) IEEE ICDE , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 21
    • 40049111546 scopus 로고    scopus 로고
    • Verifying Completeness of Relational Query Answers from Online Servers
    • H. Pang and K.-L. Tan. Verifying Completeness of Relational Query Answers from Online Servers. ACM Transactions on Information and System Security, 11(2):1-50, 2008.
    • (2008) ACM Transactions on Information and System Security , vol.11 , Issue.2 , pp. 1-50
    • Pang, H.1    Tan, K.-L.2
  • 22
    • 85011016388 scopus 로고    scopus 로고
    • CADS: Continuous Authentication on Data Streams
    • S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, pages 135-146, 2007.
    • (2007) VLDB , pp. 135-146
    • Papadopoulos, S.1    Yang, Y.2    Papadias, D.3
  • 25
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 26
    • 0344379339 scopus 로고    scopus 로고
    • SHA. NIST. FIPS
    • SHA. Secure Hashing Algorithm. NIST. FIPS 180-2, 2001.
    • (2001) Secure Hashing Algorithm , pp. 180-182
  • 27
    • 58349110852 scopus 로고    scopus 로고
    • Privacy Protection in Personalized Search
    • June
    • X. Shen, B. Tan, and C. Zhai. Privacy Protection in Personalized Search. ACM SIGIR, 41(1):4-17, June 2007.
    • (2007) ACM SIGIR , vol.41 , Issue.1 , pp. 4-17
    • Shen, X.1    Tan, B.2    Zhai, C.3
  • 29
    • 85038471469 scopus 로고    scopus 로고
    • TREC. Text REtrieval Conference
    • TREC. Text REtrieval Conference. http://trec.nist.gov/.
  • 30
    • 33750984193 scopus 로고    scopus 로고
    • Minimum-Cost Network Hardening Using Attack Graphs
    • L. Wang, S. Noel, and S. Jajodia. Minimum-Cost Network Hardening Using Attack Graphs. Computer Communications, 29(18):3812-3824, 2006.
    • (2006) Computer Communications , vol.29 , Issue.18 , pp. 3812-3824
    • Wang, L.1    Noel, S.2    Jajodia, S.3
  • 31
    • 0030407491 scopus 로고    scopus 로고
    • Query Expansion Using Local and Global Document Analysis
    • J. Xu and W. B. Croft. Query Expansion Using Local and Global Document Analysis. In ACM SIGIR, pages 4-11, 1996.
    • (1996) ACM SIGIR , pp. 4-11
    • Xu, J.1    Croft, W.B.2
  • 32
    • 33747729581 scopus 로고    scopus 로고
    • Inverted Files for Text Search Engine
    • July
    • J. Zobel and A. Moffat. Inverted Files for Text Search Engine. ACM Computing Surveys, 38(2), July 2006.
    • (2006) ACM Computing Surveys , vol.38 , Issue.2
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.