Towards Efficient Authenticated Subgraph Query Service in Outsourced Graph Databases
暂无分享,去创建一个
[1] Feifei Li,et al. Small synopses for group-by query verification on outsourced data streams , 2009, TODS.
[2] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.
[3] Kyriakos Mouratidis,et al. Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..
[4] Prasenjit Mitra,et al. Lindex: a lattice-based index for graph databases , 2012, The VLDB Journal.
[5] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[6] Jianzhong Li,et al. Hash-base subgraph query processing method for graph-structured XML documents , 2008, Proc. VLDB Endow..
[7] Kian-Lee Tan,et al. Query Answer Authentication , 2012, Synthesis Lectures on Data Management.
[8] Elisa Bertino,et al. How to authenticate graphs without leaking , 2010, EDBT '10.
[9] Dolwichit Jannarm Dolwichit Jannarm. การจัดการ IT Outsourcing , 2014 .
[10] Karsten Klein,et al. CT-index: Fingerprint-based graph indexing combining cycles and trees , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[11] Jeffrey Xu Yu,et al. Taming verification hardness: an efficient algorithm for testing subgraph isomorphism , 2008, Proc. VLDB Endow..
[12] TanKian-Lee,et al. Query assurance verification for outsourced multi-dimensional databases , 2009 .
[13] Elisa Bertino,et al. Leakage-free redactable signatures , 2012, CODASPY '12.
[14] Jiawei Han,et al. gSpan: graph-based substructure pattern mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[15] Joachim Posegga,et al. On Structural Signatures for Tree Data Structures , 2012, ACNS.
[16] Ambuj K. Singh,et al. Closure-Tree: An Index Structure for Graph Queries , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[17] Jeffrey Xu Yu,et al. iGraph: A Framework for Comparisons of Disk-Based Graph Indexing Techniques , 2010, Proc. VLDB Endow..
[18] Michael Y. Galperin,et al. The 2012 Nucleic Acids Research Database Issue and the online Molecular Biology Database Collection , 2011, Nucleic Acids Res..
[19] Elisa Bertino,et al. Structural signatures for tree data structures , 2008, Proc. VLDB Endow..
[20] Philip S. Yu,et al. Graph indexing: a frequent structure-based approach , 2004, SIGMOD '04.
[21] Daniel A. Menascé,et al. QoS Issues in Web Services , 2002, IEEE Internet Comput..
[22] Wei Wang,et al. Efficient mining of frequent subgraphs in the presence of isomorphism , 2003, Third IEEE International Conference on Data Mining.
[23] Yin Yang,et al. Spatial Outsourcing for Location-based Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[24] Elisa Bertino,et al. Efficient Leakage-free Authentication of Trees, Graphs and Forests , 2012, IACR Cryptol. ePrint Arch..
[25] Wilfred Ng,et al. Fg-index: towards verification-free query processing on graph databases , 2007, SIGMOD '07.
[26] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[27] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[28] PangHweeHwa,et al. Authenticating the query results of text search engines , 2008, VLDB 2008.
[29] Dennis Shasha,et al. Algorithmics and applications of tree and graph searching , 2002, PODS.
[30] Kian-Lee Tan,et al. Query assurance verification for outsourced multi-dimensional databases , 2009, J. Comput. Secur..
[31] Michael Gertz,et al. A General Model for Authenticated Data Structures , 2004, Algorithmica.
[32] Yin Yang,et al. Continuous authentication on relational streams , 2009, The VLDB Journal.
[33] Lei Zou,et al. A novel spectral coding in a large graph database , 2008, EDBT '08.
[34] Kyriakos Mouratidis,et al. Efficient verification of shortest path search via authenticated hints , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).