메뉴 건너뛰기




Volumn 47, Issue 1, 2010, Pages 182-190

Server transparent query authentication of outsourced database

Author keywords

Chain embedded signature(CES); Outsourced database(ODB); Query authentication; Server transparent; Verification object(VO)

Indexed keywords

AUTHENTICATION DATA; AUTHENTICATION METHODS; AUTHENTICATION SERVERS; COMMUNICATION PROTOCOLS; COST ANALYSIS; DATABASE TRANSACTIONS; EMBEDDED SIGNATURES; FUNCTIONAL EXTENSION; QUERY AUTHENTICATION; QUERY RESULTS; RAPID GROWTH; REAL SYSTEMS; SECURITY REQUIREMENTS; TIME AND SPACE; VERIFICATION TASK;

EID: 77950572596     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (13)

References (13)
  • 2
    • 77950564366 scopus 로고    scopus 로고
    • Stubblebine. Authentic third-party data publication
    • Devanbu P, Gertz M, Martel C, et al. Stubblebine. Authentic third-party data publication[OL]. [2009-06-05]. http://seclab.cs.ucdavis.edu ~devanbu authdbpub.pdf
    • Devanbu, P.1    Gertz, M.2    Martel, C.3
  • 5
    • 85011031975 scopus 로고    scopus 로고
    • Proof-infused streams: Enabling authentication of sliding windows queries on streams
    • Vienna, Austria: VLDB Endowment
    • Li F, Yi K, Hadjieleftheriou M, et al. Proof-infused streams: Enabling authentication of sliding windows queries on streams[C]//Proc of the 33rd Int Conf on Very Large Data Bases (VLDB 2007): Vienna, Austria: VLDB Endowment, 2007: 147-158
    • (2007) Proc of the 33rd Int Conf on Very Large Data Bases (VLDB 2007) , pp. 147-158
    • Li, F.1    Yi, K.2    Hadjieleftheriou, M.3
  • 8
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and integrity in outsourced databases
    • Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases[J].ACM Trans on Storage, 2006, 2(2): 107-138
    • (2006) ACM Trans on Storage , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 10
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Los Alamitos, CA: IEEE Computer Society
    • Pang H, Tan K -L. Authenticating query results in edge computing[C]//Proc of the 20th Int Conf on Data Engineering. Los Alamitos, CA: IEEE Computer Society, 2004: 560-571
    • (2004) Proc of the 20th Int Conf on Data Engineering , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 11
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Trondheim, Norway: VLDB Endowment
    • Sion R. Query execution assurance for outsourced databases[C]//Proc of the 31st VLDB Conference. Trondheim, Norway: VLDB Endowment, 2005: 601-612
    • (2005) Proc of the 31st VLDB Conference , pp. 601-612
    • Sion, R.1
  • 13
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of database relations
    • Guo H, Li Y, Liu A, et al. A fragile watermarking scheme for detecting malicious modifications of database relations[J]. Information Sciences, 2006, 176(10): 1350-1378
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.