Scalable Verification for Outsourced Dynamic Databases

Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurren...

Full description

Saved in:
Bibliographic Details
Main Authors: PANG, Hwee Hwa, ZHANG, Jilian, MOURATIDIS, Kyriakos
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/876
https://ink.library.smu.edu.sg/context/sis_research/article/1875/viewcontent/VLDB09_Authentication.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English