Managing Integrity for Data Exchanged on the Web

The World Wide Web is a medium for publishing data used by collaborating groups and communities of shared interest. This paper proposes mechanisms to support the accuracy and authenticity of published data. In our framework, publishers annotate data with virtually unforgeable evidence of authorship. Intermediaries may query, restructure, and integrate this data while propagating the annotations. Final recipients of the data may then derive useful conclusions about the authenticity of the data they receive.

[1]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[4]  Donald E. Eastlake,et al.  XML-Signature Syntax and Processing , 2001, RFC.

[5]  Sanjeev Khanna,et al.  Why and Where: A Characterization of Data Provenance , 2001, ICDT.

[6]  Silvio Micali,et al.  Transitive Signature Schemes , 2002, CT-RSA.

[7]  Sanjeev Khanna,et al.  Edinburgh Research Explorer On the Propagation of Deletions and Annotations through Views , 2013 .

[8]  Dan Suciu,et al.  Modeling Integrity in Data Exchange , 2004, Secure Data Management.

[9]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[10]  Michael Gertz,et al.  Flexible authentication of XML documents , 2001, CCS '01.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[13]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Jennifer Widom,et al.  Practical lineage tracing in data warehouses , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).

[16]  R. Ostrovsky,et al.  Efficient Consistency Proofs on a Committed Database , 2003 .

[17]  Elisa Bertino,et al.  An infrastructure for managing secure update operations on XML data , 2003, SACMAT '03.

[18]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[19]  Sanjeev Khanna,et al.  Data Provenance: Some Basic Issues , 2000, FSTTCS.

[20]  Peter Stañski,et al.  Content extraction signatures using XML digital signatures and custom transforms on-demand , 2003, WWW '03.