메뉴 건너뛰기




Volumn 2, Issue 1, 2009, Pages 802-813

Scalable verification for outsourced dynamic databases

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 77952757644     PISSN: None     EISSN: 21508097     Source Type: Conference Proceeding    
DOI: 10.14778/1687627.1687718     Document Type: Article
Times cited : (97)

References (32)
  • 1
    • 33845205821 scopus 로고    scopus 로고
    • MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library
    • MIRACL: Multiprecision Integer and Rational Arithmetic C/C++ Library. http://www.shamus.ie.
  • 2
    • 84873848488 scopus 로고    scopus 로고
    • OpenSSL Project
    • OpenSSL Project. http://www.openssl.org.
  • 5
    • 0014814325 scopus 로고
    • Space/Time Trade-Offs in Hash Coding with Allowable Errors
    • B. Bloom. Space/Time Trade-Offs in Hash Coding with Allowable Errors. Communications of the ACM, 13(7):422-426, July 1970.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.1
  • 6
    • 4143140890 scopus 로고    scopus 로고
    • A Survey of Two Signature Aggregation Techniques
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. A Survey of Two Signature Aggregation Techniques. CryptoBytes, 6(2), 2003.
    • (2003) CryptoBytes , vol.6 , Issue.2
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 7
    • 84946840347 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • D. Boneh, B. Lynn, and H. Shacham. Short Signatures from the Weil Pairing. In AsiaCrypt, pages 514-532, 2001.
    • (2001) AsiaCrypt , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 8
    • 85039686150 scopus 로고    scopus 로고
    • Certicom. SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0
    • Certicom. SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Standards for Efficient Cryptography, September 2000. http://www.secg.org/download/aid-386/sec2 final.pdf.
    • (2000) Standards for Efficient Cryptography
  • 9
    • 33746749406 scopus 로고    scopus 로고
    • Authenticating Multi-Dimensional Query Results in Data Publishing
    • W. Cheng, H. Pang, and K.-L. Tan. Authenticating Multi-Dimensional Query Results in Data Publishing. In DBSec, pages 60-73, July 2006.
    • (2006) DBSec , pp. 60-73
    • Cheng, W.1    Pang, H.2    Tan, K.-L.3
  • 10
    • 84859205683 scopus 로고    scopus 로고
    • Query Assurance Verification for Outsourced Multi-dimensional Databases
    • W. Cheng and K.-L. Tan. Query Assurance Verification for Outsourced Multi-dimensional Databases. Journal of Computer Security, 2008.
    • (2008) Journal of Computer Security
    • Cheng, W.1    Tan, K.-L.2
  • 11
    • 0018480749 scopus 로고
    • Ubiquitous B-Tree
    • D. Comer. Ubiquitous B-Tree. ACM Computing Surveys, 11(2):121-137, 1979.
    • (1979) ACM Computing Surveys , vol.11 , Issue.2 , pp. 121-137
    • Comer, D.1
  • 13
    • 85039679294 scopus 로고    scopus 로고
    • Fact Sheet NSA Suite B Cryptography
    • Fact Sheet NSA Suite B Cryptography. National Security Agency. http://www.nsa.gov/ia/industry/crypto suite b.cfm.
    • National Security Agency
  • 15
    • 43149099270 scopus 로고    scopus 로고
    • Super-Efficient Verification of Dynamic Outsourced Databases
    • M. T. Goodrich, R. Tamassia, and N. Triandopoulos. Super-Efficient Verification of Dynamic Outsourced Databases. In CT-RSA, pages 407-424, 2008.
    • (2008) CT-RSA , pp. 407-424
    • Goodrich, M.T.1    Tamassia, R.2    Triandopoulos, N.3
  • 16
    • 21144454271 scopus 로고    scopus 로고
    • Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups
    • A. Joux and K. Nguyen. Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. Journal of Cryptology, 16(4):239-247, 2003.
    • (2003) Journal of Cryptology , vol.16 , Issue.4 , pp. 239-247
    • Joux, A.1    Nguyen, K.2
  • 18
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic Authenticated Index Structures for Outsourced Databases
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic Authenticated Index Structures for Outsourced Databases. In SIGMOD, pages 121-132, 2006.
    • (2006) SIGMOD , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 19
    • 33646734695 scopus 로고    scopus 로고
    • Authenticating Query Results in Data Publishing
    • D. Ma, R. H. Deng, H. Pang, and J. Zhou. Authenticating Query Results in Data Publishing. In ICICS, pages 376-388, 2005.
    • (2005) ICICS , pp. 376-388
    • Ma, D.1    Deng, R.H.2    Pang, H.3    Zhou, J.4
  • 21
    • 84969346266 scopus 로고
    • A Certified Digital Signature
    • R. C. Merkle. A Certified Digital Signature. In Crypto, pages 218-238, 1989.
    • (1989) Crypto , pp. 218-238
    • Merkle, R.C.1
  • 22
    • 58149462240 scopus 로고    scopus 로고
    • Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases
    • K. Mouratidis, D. Sacharidis, and H. Pang. Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases. International Journal on Very Large Data Bases, 18(1):363-381, 2009.
    • (2009) International Journal on Very Large Data Bases , vol.18 , Issue.1 , pp. 363-381
    • Mouratidis, K.1    Sacharidis, D.2    Pang, H.3
  • 23
    • 33747176236 scopus 로고    scopus 로고
    • Authentication and Integrity in Outsourced Databases
    • M. Narasimha, E. Mykletun, and G. Tsudik. Authentication and Integrity in Outsourced Databases. ACM Transactions on Storage, 2(2):107-138, May 2006.
    • (2006) ACM Transactions on Storage , vol.2 , Issue.2 , pp. 107-138
    • Narasimha, M.1    Mykletun, E.2    Tsudik, G.3
  • 24
    • 33745528450 scopus 로고    scopus 로고
    • Authentication of Outsourced Databases using Signature Aggregation and Chaining
    • M. Narasimha and G. Tsudik. Authentication of Outsourced Databases using Signature Aggregation and Chaining. In DASFAA, pages 420-436, 2006.
    • (2006) DASFAA , pp. 420-436
    • Narasimha, M.1    Tsudik, G.2
  • 25
    • 26444554946 scopus 로고    scopus 로고
    • Verified Query Results from Hybrid Authentication Trees
    • G. Nuckolls. Verified Query Results from Hybrid Authentication Trees. In DBSec, pages 84-98, 2005.
    • (2005) DBSec , pp. 84-98
    • Nuckolls, G.1
  • 26
    • 29844457793 scopus 로고    scopus 로고
    • Verifying Completeness of Relational Query Results in Data Publishing
    • H. Pang, A. Jain, K. Ramamritham, and K.-L. Tan. Verifying Completeness of Relational Query Results in Data Publishing. In ACM SIGMOD, pages 407-418, 2005.
    • (2005) ACM SIGMOD , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.-L.4
  • 27
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating Query Results in Edge Computing
    • H. Pang and K.-L. Tan. Authenticating Query Results in Edge Computing. In IEEE ICDE, pages 560-571, 2004.
    • (2004) IEEE ICDE , pp. 560-571
    • Pang, H.1    Tan, K.-L.2
  • 28
    • 85011016388 scopus 로고    scopus 로고
    • CADS: Continuous Authentication on Data Streams
    • S. Papadopoulos, Y. Yang, and D. Papadias. CADS: Continuous Authentication on Data Streams. In VLDB, pages 135-146, 2007.
    • (2007) VLDB , pp. 135-146
    • Papadopoulos, S.1    Yang, Y.2    Papadias, D.3
  • 29
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 30
    • 84865086653 scopus 로고    scopus 로고
    • Prefix Compression of Sparse Binary Strings
    • D. Salomon. Prefix Compression of Sparse Binary Strings. Crossroads, 6(3):22-25, 2000.
    • (2000) Crossroads , vol.6 , Issue.3 , pp. 22-25
    • Salomon, D.1
  • 31
    • 85039677615 scopus 로고    scopus 로고
    • SHA
    • NIST. FIPS
    • SHA. Secure Hashing Algorithm. NIST. FIPS 180-2, 2001.
    • (2001) Secure Hashing Algorithm , pp. 180-182
  • 32
    • 85039694120 scopus 로고    scopus 로고
    • The Case for Elliptic Curve Cryptography
    • The Case for Elliptic Curve Cryptography. National Security Agency. http://www.nsa.gov/ia/industry/crypto elliptic curve.cfm.
    • National Security Agency


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.