Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a ve...
Saved in:
Main Authors: | PANG, Hwee Hwa, TAN, Kian-Lee |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1141 https://ink.library.smu.edu.sg/context/sis_research/article/2140/viewcontent/AuthenticatingQueryResultsEdgeComputing_2004.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Authenticating the Query Results of Text Search Engines
by: PANG, Hwee Hwa, et al.
Published: (2008) -
Corner edge cutting and Dixon A-resultant quotients
by: Foo, M.-C., et al.
Published: (2013) -
Query Answer Authentication
by: PANG, Hwee Hwa, et al.
Published: (2012) -
Partially Materialized Digest Scheme: An Efficient Verification Method for Outsourced Databases
by: MOURATIDIS, Kyriakos, et al.
Published: (2009) -
JALAD : joint accuracy- and latency-aware deep structure decoupling for edge-cloud execution
by: Li, Hongshan, et al.
Published: (2020)