Cargando…
Query Answer Authentication
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Morgan & Claypool Publishers
2012
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1486610 |
_version_ | 1780926155338022912 |
---|---|
author | Pang, HweeHwa Tan, Kian-Lee |
author_facet | Pang, HweeHwa Tan, Kian-Lee |
author_sort | Pang, HweeHwa |
collection | CERN |
description | In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication me |
id | cern-1486610 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2012 |
publisher | Morgan & Claypool Publishers |
record_format | invenio |
spelling | cern-14866102021-04-22T00:16:43Zhttp://cds.cern.ch/record/1486610engPang, HweeHwaTan, Kian-LeeQuery Answer AuthenticationComputing and ComputersIn data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication meMorgan & Claypool Publishersoai:cds.cern.ch:14866102012 |
spellingShingle | Computing and Computers Pang, HweeHwa Tan, Kian-Lee Query Answer Authentication |
title | Query Answer Authentication |
title_full | Query Answer Authentication |
title_fullStr | Query Answer Authentication |
title_full_unstemmed | Query Answer Authentication |
title_short | Query Answer Authentication |
title_sort | query answer authentication |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1486610 |
work_keys_str_mv | AT panghweehwa queryanswerauthentication AT tankianlee queryanswerauthentication |