Scalable Verification for Outsourced Dynamic Databases
Query answers from servers operated by third parties need to be verified, as the third parties may not be trusted or their servers may be compromised. Most of the existing authentication methods construct validity proofs based on the Merkle hash tree (MHT). The MHT, however, imposes severe concurren...
Saved in:
Main Authors: | PANG, Hwee Hwa, ZHANG, Jilian, MOURATIDIS, Kyriakos |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/876 https://ink.library.smu.edu.sg/context/sis_research/article/1875/viewcontent/VLDB09_Authentication.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Scalable trusted online dissemination of JPEG2000 images
by: DENG, Robert H., et al.
Published: (2005) -
Authenticating Query Results in Data Publishing
by: MA, Di, et al.
Published: (2005) -
A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices
by: KANDAPPU, Thivya, et al.
Published: (2012) -
Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases
by: MOURATIDIS, Kyriakos, et al.
Published: (2009) -
Variable permissions for concurrency verification
by: Le, D.-K., et al.
Published: (2013)