메뉴 건너뛰기




Volumn 19, Issue 2, 2010, Pages 161-180

Continuous authentication on relational streams

Author keywords

Authentication; Continuous monitoring; Data streams; Database outsourcing

Indexed keywords

AUTHENTICATION; INDEXING (MATERIALS WORKING); INDEXING (OF INFORMATION); OUTSOURCING; QUERY LANGUAGES;

EID: 77951939042     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-009-0145-2     Document Type: Article
Times cited : (29)

References (33)
  • 2
    • 52649108083 scopus 로고    scopus 로고
    • Efficient data authentication in an environment of untrusted third-party distributors
    • Atallah, M.J., Cho, Y., Kundu, A.: Efficient data authentication in an environment of untrusted third-party distributors. ICDE (2008)
    • (2008) ICDE
    • Atallah, M.J.1    Cho, Y.2    Kundu, A.3
  • 3
    • 1142303671 scopus 로고    scopus 로고
    • Dynamic sample selection for approximate query processing
    • Babcock, B., Chaudhuri, S., Das, G.: Dynamic sample selection for approximate query processing. SIGMOD (2003)
    • (2003) SIGMOD
    • Babcock, B.1    Chaudhuri, S.2    Das, G.3
  • 5
    • 52649097332 scopus 로고    scopus 로고
    • Authenticatingmulti-dimensional query results in data publishing
    • Cheng, W., Pang, H., Tan, K.-L.: Authenticatingmulti-dimensional query results in data publishing. DBSec (2006)
    • (2006) DBSec
    • Cheng, W.1    Pang, H.2    Tan, K.-L.3
  • 7
    • 0346207638 scopus 로고    scopus 로고
    • Broadcast protocols to support efficient retrieval from databases by mobile users
    • Datta, V., Vandermeer, D., Celik, A., Kumar, V.: Broadcast protocols to support efficient retrieval from databases by mobile users. ACM TODS 24(1), 1-79 (1999)
    • (1999) ACM TODS , vol.24 , Issue.1 , pp. 1-79
    • Datta, V.1    Vandermeer, D.2    Celik, A.3    Kumar, V.4
  • 9
    • 0034824924 scopus 로고    scopus 로고
    • Selectivity estimation using probability models
    • Getoor, L., Taskar, B., Koller, D.: Selectivity estimation using probability models. SIGMOD (2001)
    • (2001) SIGMOD
    • Getoor, L.1    Taskar, B.2    Koller, D.3
  • 10
    • 4143107964 scopus 로고    scopus 로고
    • Authenticated data structures for graph and geometric searching
    • Goodrich, M.,Tamassia, R.,Triandopoulos, N.,Cohen, R.: Authenticated data structures for graph and geometric searching. CT-RSA (2003)
    • (2003) CT-RSA
    • Goodrich, M.1
  • 11
    • 34548704911 scopus 로고    scopus 로고
    • Rehist: Relative Error Histogram Construction Algorithms
    • Guha, S., Shim, K., Woo, J.: Rehist: Relative Error Histogram Construction Algorithms. VLDB (2004)
    • (2004) VLDB
    • Guha, S.1    Shim, K.2    Woo, J.3
  • 12
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Hacigümüs, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. SIGMOD (2002)
    • (2002) SIGMOD
    • Hacigümüs, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 14
    • 70449395944 scopus 로고    scopus 로고
    • Structural signatures for tree data structures
    • Kundu, A., Bertino, E.: Structural signatures for tree data structures. VLDB (2008)
    • (2008) VLDB
    • Kundu, A.1    Bertino, E.2
  • 15
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. SIGMOD (2006)
    • (2006) SIGMOD
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 16
    • 85011031975 scopus 로고    scopus 로고
    • Proof-infused streams: Enabling authentication of sliding window queries on streams
    • Li, F., Yi, K., Hadjieleftheriou, M., Kollios, G.: Proof-infused streams: enabling authentication of sliding window queries on streams. VLDB (2007)
    • (2007) VLDB
    • Li, F.1    Yi, K.2    Hadjieleftheriou, M.3    Kollios, G.4
  • 18
    • 0001263548 scopus 로고
    • A certified digital signature
    • Merkle, R.: A certified digital signature. CRYPTO (1989)
    • (1989) CRYPTO
    • Merkle, R.1
  • 19
    • 33746668803 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/condensed signatures
    • Mykletun, E., Narasimha, M., Tsudik, G.: Signature bouquets: immutability for aggregated/condensed signatures. ESORICS (2004)
    • (2004) ESORICS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 20
    • 34548160016 scopus 로고    scopus 로고
    • Authentication of out sourced databases using signature aggregation and chaining
    • Narasimha, M., Tsudik, G.: Authentication of out sourced databases using signature aggregation and chaining. DASFAA (2006).
    • (2006) DASFAA
    • Narasimha, M.1    Tsudik, G.2
  • 21
    • 0003629991 scopus 로고
    • National Institute of Standards and Technology. FIPS PUB 180-1, National Institute of Standards and Technology
    • National Institute of Standards and Technology. FIPS PUB 180-1: Secure Hash Standard. National Institute of Standards and Technology (1995)
    • (1995) Secure Hash Standard
  • 22
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. SIGMOD (2005)
    • (2005) SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 23
    • 76849102606 scopus 로고    scopus 로고
    • Authenticating the query results of text search engines
    • Pang, H., Mouratidis, K.: Authenticating the query results of text search engines. VLDB (2008)
    • (2008) VLDB
    • Pang, H.1    Mouratidis, K.2
  • 24
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • Pang, H., Tan, K.-L.: Authenticating query results in edge computing. ICDE (2004)
    • (2004) ICDE
    • Pang, H.1    Tan, K.-L.2
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120-126 (1978)
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 26
    • 33745601730 scopus 로고    scopus 로고
    • Query execution assurance for outsourced databases
    • Sion, R.: Query execution assurance for outsourced databases. VLDB (2005)
    • (2005) VLDB
    • Sion, R.1
  • 29
    • 84997556980 scopus 로고    scopus 로고
    • Integrity audit of outsourced data
    • Xie, M., Wang, H., Yin, J., Meng, X.: Integrity audit of outsourced data. VLDB (2007)
    • (2007) VLDB
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 30
    • 67649510426 scopus 로고    scopus 로고
    • Authenticated indexing for outsourced spatial databases
    • Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Authenticated indexing for outsourced spatial databases. VLDB J. 18(3), 631 (2009)
    • (2009) VLDB J , vol.18 , Issue.3 , pp. 631
    • Yang, Y.1    Papadopoulos, S.2    Papadias, D.3    Kollios, G.4
  • 33
    • 33747729581 scopus 로고    scopus 로고
    • Inverted files for text search engines
    • Zobel, J., Moffat, A.: Inverted files for text search engines. ACM Comput. Surv. 38(2), (2006).
    • (2006) ACM Comput. Surv , vol.38 , Issue.2
    • Zobel, J.1    Moffat, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.