메뉴 건너뛰기




Volumn 6, Issue 7, 2013, Pages 529-540

CorrectDB: SQL engine with practical query authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION;

EID: 84881117836     PISSN: None     EISSN: 21508097     Source Type: Journal    
DOI: 10.14778/2536349.2536353     Document Type: Article
Times cited : (33)

References (35)
  • 1
    • 84881118536 scopus 로고    scopus 로고
    • IBM 4765 PCIe Cryptographic Coprocessor. Online at
    • IBM 4765 PCIe Cryptographic Coprocessor. Online at http://www-03.ibm.com/security/cryptocards/.
  • 2
    • 84881098968 scopus 로고    scopus 로고
    • TPC-H. Online at
    • TPC-H. Online at http://www.tpc.org/tpch/.
  • 3
    • 84881102215 scopus 로고    scopus 로고
    • Trusteddb: A trusted hardware based database with privacy, and data confidentiality
    • PrePrints
    • S. Bajaj, and R. Sion. Trusteddb: A trusted hardware based database with privacy, and data confidentiality. IEEE Transactions on Knowledge, and Data Engineering, 99(PrePrints):1, 2013.
    • (2013) IEEE Transactions on Knowledge, and Data Engineering , vol.99 , pp. 1
    • Bajaj, S.1    Sion, R.2
  • 4
    • 84881096857 scopus 로고    scopus 로고
    • Secure data outsourcing
    • Springer US, L. Liu, and M. T. Özsu, editors
    • B. Carminati. Secure data outsourcing. In L. Liu, and M. T. Özsu, editors, Encyclopedia of Database Systems. Springer US, 2009.
    • (2009) Encyclopedia of Database Systems
    • Carminati, B.1
  • 5
    • 78650219479 scopus 로고    scopus 로고
    • On securing untrusted clouds with cryptography
    • E. Al-Shaer, and K. B. Frikken, editors, ACM
    • Y. Chen, and R. Sion. On securing untrusted clouds with cryptography. In E. Al-Shaer, and K. B. Frikken, editors, WPES, pages 109-114. ACM, 2010.
    • (2010) WPES , pp. 109-114
    • Chen, Y.1    Sion, R.2
  • 6
    • 84881113576 scopus 로고    scopus 로고
    • To cloud or not to cloud? musings on costs, and viability
    • Y. Chen, and R. Sion. To cloud or not to cloud? musings on costs, and viability. In SOCC. ACM, 2011.
    • (2011) SOCC. ACM
    • Chen, Y.1    Sion, R.2
  • 7
    • 52649097332 scopus 로고    scopus 로고
    • Authenticating multi-dimensional query results in data publishing
    • W. Cheng, H. Pang,, and K. lee Tan. Authenticating multi-dimensional query results in data publishing. In In DBSec, 2006.
    • (2006) DBSec
    • Cheng, W.1    Pang, H.2    Lee Tan, K.3
  • 9
    • 33746748166 scopus 로고    scopus 로고
    • Aggregation Queries in the Database-As-a-Service Model
    • Einar Mykletun, and Gene Tsudik. Aggregation Queries in the Database-As-a-Service Model. Data, and Applications Security, 4127, 2006.
    • (2006) Data, and Applications Security , vol.4127
    • Mykletun, E.1    Tsudik, G.2
  • 10
    • 84964426510 scopus 로고    scopus 로고
    • Implementation of an authenticated dictionary with skip lists, and commutative hashing
    • IEEE Computer Society Press
    • M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists, and commutative hashing. In DISCEX, pages 68 - 82. IEEE Computer Society Press, 2001.
    • (2001) DISCEX , pp. 68-82
    • Goodrich, M.T.1    Tamassia, R.2    Schwerin, A.3
  • 11
    • 16644385952 scopus 로고    scopus 로고
    • Efficient execution of aggregation queries over encrypted relational databases
    • H. Hacigumus, B. Iyer, and S. Mehrotra. Efficient execution of aggregation queries over encrypted relational databases. In DASFAA, volume 2973, pages 633-650, 2004.
    • (2004) DASFAA , vol.2973 , pp. 633-650
    • Hacigumus, H.1    Iyer, B.2    Mehrotra, S.3
  • 12
    • 78650610346 scopus 로고    scopus 로고
    • Verifying spatial queries using voronoi neighbors
    • ACM
    • L. Hu, W.-S. Ku, S. Bakiras, and C. Shahabi. Verifying spatial queries using voronoi neighbors. In Proceedings of GIS, pages 350-359. ACM, 2010.
    • (2010) Proceedings of GIS , pp. 350-359
    • Hu, L.1    Ku, W.-S.2    Bakiras, S.3    Shahabi, C.4
  • 13
    • 84881108104 scopus 로고    scopus 로고
    • IBM 4764 PCI-X, 4765 PCIe Cryptographic Coprocessors. Online at
    • IBM 4764 PCI-X, 4765 PCIe Cryptographic Coprocessors. Online at http://www-03.ibm.com/security/cryptocards/.
  • 15
    • 34250630995 scopus 로고    scopus 로고
    • Dynamic authenticated index structures for outsourced databases
    • ACM
    • F. Li, M. Hadjieleftheriou, G. Kollios, and L. Reyzin. Dynamic authenticated index structures for outsourced databases. In Proceedings of SIGMOD, pages 121 - 132. ACM, 2006.
    • (2006) Proceedings of SIGMOD , pp. 121-132
    • Li, F.1    Hadjieleftheriou, M.2    Kollios, G.3    Reyzin, L.4
  • 17
    • 83055179387 scopus 로고    scopus 로고
    • Authentication of location-based skyline queries
    • ACM
    • X. Lin, J. Xu, and H. Hu. Authentication of location-based skyline queries. In Proceedings of CIKM, pages 1583-1588. ACM, 2011.
    • (2011) Proceedings of CIKM , pp. 1583-1588
    • Lin, X.1    Xu, J.2    Hu, H.3
  • 19
    • 84969346266 scopus 로고
    • A certified digital signature
    • Springer-Verlag New York, Inc.
    • R. C. Merkle. A certified digital signature. In Proceedings on Advances in cryptology, pages 218-238. Springer-Verlag New York, Inc., 1989.
    • (1989) Proceedings on Advances in cryptology , pp. 218-238
    • Merkle, R.C.1
  • 20
    • 33746668803 scopus 로고    scopus 로고
    • Signature bouquets: Immutability for aggregated/condensed signatures
    • E. Mykletun, M. Narasimha, and G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In ESORICS, 2004.
    • (2004) ESORICS
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 21
    • 33747176236 scopus 로고    scopus 로고
    • Authentication, and integrity in outsourced databases
    • E. Mykletun, M. Narasimha, and G. Tsudik. Authentication, and integrity in outsourced databases. ACM TOS, Volume 2 Issue 2, pages 107 - 138, 2006.
    • (2006) ACM TOS , vol.2 , Issue.2 , pp. 107-138
    • Mykletun, E.1    Narasimha, M.2    Tsudik, G.3
  • 22
    • 33745798432 scopus 로고    scopus 로고
    • Dsac: integrity for outsourced databases with signature aggregation, and chaining
    • M. Narasimha, and G. Tsudik. Dsac: integrity for outsourced databases with signature aggregation, and chaining. In Proceedings of CIKM. ACM, 2005.
    • (2005) Proceedings of CIKM. ACM
    • Narasimha, M.1    Tsudik, G.2
  • 23
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • ACM
    • H. Pang, A. Jain, K. Ramamritham, and K. Tan. Verifying completeness of relational query results in data publishing. In Proceedings of SIGMOD, pages 407 - 418. ACM, 2005.
    • (2005) Proceedings of SIGMOD , pp. 407-418
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.4
  • 24
    • 2442590644 scopus 로고    scopus 로고
    • Authenticating query results in edge computing
    • IEEE Computer Society
    • H. Pang, and K.-L. Tan. Authenticating query results in edge computing. In Proceedings of ICDE, page 560. IEEE Computer Society, 2004.
    • (2004) Proceedings of ICDE , pp. 560
    • Pang, H.1    Tan, K.-L.2
  • 25
    • 77952757644 scopus 로고    scopus 로고
    • Scalable verification for outsourced dynamic databases
    • H. Pang, J. Zhang, and K. Mouratidi. Scalable verification for outsourced dynamic databases. Proceedings of the VLDB Endowment, Volume 2 Issue 1, pages 802 - 813, 2009.
    • (2009) Proceedings of the VLDB Endowment , vol.2 , Issue.1 , pp. 802-813
    • Pang, H.1    Zhang, J.2    Mouratidi, K.3
  • 26
    • 67649657667 scopus 로고    scopus 로고
    • Separating authentication from query execution in outsourced databases
    • IEEE Computer Society
    • S. Papadopoulos, D. Papadias, W. Cheng, and K.-L. Tan. Separating authentication from query execution in outsourced databases. In Proceedings of ICDE, pages 1148 - 1151. IEEE Computer Society, 2009.
    • (2009) Proceedings of ICDE , pp. 1148-1151
    • Papadopoulos, S.1    Papadias, D.2    Cheng, W.3    Tan, K.-L.4
  • 27
    • 84924359730 scopus 로고    scopus 로고
    • Cloud performance benchmark series, network performance: Amazon ec2
    • Online at
    • S. Sanghrajka, N. Mahajan, and R. Sion. Cloud performance benchmark series, network performance: Amazon ec2. Online at www.cloudcommons.org.
    • Sanghrajka, S.1    Mahajan, N.2    Sion, R.3
  • 28
    • 43349086016 scopus 로고    scopus 로고
    • Ensuring correctness over untrusted private database
    • ACM
    • S. Singh, and S. Prabhakar. Ensuring correctness over untrusted private database. In Proceedings of EDBT, pages 476 - 486. ACM, 2008.
    • (2008) Proceedings of EDBT , pp. 476-486
    • Singh, S.1    Prabhakar, S.2
  • 29
    • 84956968842 scopus 로고    scopus 로고
    • Outbound authentication for programmable secure coprocessors
    • Springer-Verlag
    • S. W. Smith. Outbound authentication for programmable secure coprocessors. In Proceedings of ESORICS, pages 72-89. Springer-Verlag, 2002.
    • (2002) Proceedings of ESORICS , pp. 72-89
    • Smith, S.W.1
  • 30
    • 79959972183 scopus 로고    scopus 로고
    • TrustedDB: A Trusted Hardware based Database with Privacy, and Data Confidentiality
    • ACM
    • Sumeet Bajaj, and Radu Sion. TrustedDB: A Trusted Hardware based Database with Privacy, and Data Confidentiality. In Proceedings of SIGMOD, pages 205-216. ACM, 2011.
    • (2011) Proceedings of SIGMOD , pp. 205-216
    • Bajaj, S.1    Sion, R.2
  • 31
    • 84997556980 scopus 로고    scopus 로고
    • Integrity auditing of outsourced data
    • VLDB Endowment
    • M. Xie, H. Wang, J. Yin, and X. Meng. Integrity auditing of outsourced data. In Proceedings of VLDB, pages 782 - 793. VLDB Endowment, 2007.
    • (2007) Proceedings of VLDB , pp. 782-793
    • Xie, M.1    Wang, H.2    Yin, J.3    Meng, X.4
  • 34
    • 83255176095 scopus 로고    scopus 로고
    • Authentication of range query results in mapreduce environments
    • ACM
    • Z. Yang, S. Gao, J. Xu, and B. Choi. Authentication of range query results in mapreduce environments. In Proceedings of CloudDB, pages 25-32. ACM, 2011.
    • (2011) Proceedings of CloudDB , pp. 25-32
    • Yang, Z.1    Gao, S.2    Xu, J.3    Choi, B.4
  • 35
    • 84881111603 scopus 로고    scopus 로고
    • Efficient query integrity for outsourced dynamic databases
    • Q. Zheng, S. Xu, and G. Ateniese. Efficient query integrity for outsourced dynamic databases. 2012.
    • (2012)
    • Zheng, Q.1    Xu, S.2    Ateniese, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.