Query integrity verification based-on MAC chain in cloud storage
暂无分享,去创建一个
Tao Wen | Quan Gu | Jun Hong | Gang Sheng | Jun Hong | Tao Wen | Quan Gu | Gang Sheng
[1] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[2] Michael T. Goodrich,et al. Super-Efficient Verification of Dynamic Outsourced Databases , 2008, CT-RSA.
[3] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[6] Yin Yang,et al. CADS: Continuous Authentication on Data Streams , 2007, VLDB.
[7] Praveen Gauravaram,et al. Cryptographic Hash Functions , 2010, Encyclopedia of Information Assurance.
[8] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.
[9] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[10] Zhang Min,et al. Study on Cloud Computing Security , 2011 .
[11] Wen Tao,et al. Query Results Authentication of Outsourced Append-Only Databases , 2012 .
[12] Ying Yin,et al. Verifying correctness of inner product of vectors in cloud computing , 2013, Cloud Computing '13.
[13] Chen Chi,et al. Server Transparent Query Authentication of Outsourced Database , 2010 .
[14] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[15] Gene Tsudik,et al. DSAC: integrity for outsourced databases with signature aggregation and chaining , 2005, CIKM '05.
[16] Ying Yin,et al. Privacy Preserving Inner Product of Vectors in Cloud Computing , 2014, Int. J. Distributed Sens. Networks.
[17] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[18] Dengguo Feng,et al. Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .
[19] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[20] Xiaofeng Meng,et al. Providing freshness guarantees for outsourced databases , 2008, EDBT '08.