skip to content
Query answer authentication Preview this item
ClosePreview this item
Checking...

Query answer authentication

Author: HweeHwa Pang; Kian-Lee Tan
Publisher: [San Rafael, Calif.] : Morgan & Claypool Publishers, ©2012.
Series: Synthesis lectures on data management, #24.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Pang, Hweehwa.
Query answer authentication.
San Rafael : Morgan & Claypool, 2012
(OCoLC)778067537
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: HweeHwa Pang; Kian-Lee Tan
ISBN: 9781608457663 1608457664
OCLC Number: 779514204
Description: 1 online resource (xiii, 89 pages) : illustrations (some color).
Contents: 1. Introduction --
1.1 System and threat models --
1.2 Cost factors --
1.3 Organization. 2. Cryptography foundation --
2.1 Cryptographic protocols --
2.2 Cost of cryptographic protocols. 3. Relational queries --
3.1 Background --
3.2 Selection query --
3.2.1 Overview of authentication techniques for range selection --
3.2.2 Merkle hash tree technique --
3.2.3 Signature aggregation technique --
3.3 Projection query --
3.4 Join query --
3.5 Aggregation query --
3.5.1 Partial sum hierarchy --
3.5.2 Certified partial sum hierarchy --
3.5.3 Query processing using the partial sum hierarchy --
3.5.4 Data organization --
3.5.5 Extension to other aggregation functions --
3.5.6 Other techniques related to aggregation query --
3.6 Summary. 4. Spatial queries --
4.1 Background --
4.2 Authenticating window query --
4.2.1 Merkle hash-based schemes --
4.2.2 Signature-chain based schemes --
4.3 Authenticating kNN/range query --
4.3.1 A computational geometry approach --
4.3.2 A signature-based scheme --
4.4 Authenticating reverse nearest neighbor queries --
4.5 Summary. 5. Text search queries --
5.1 Background on text search --
5.2 Problem formulation --
5.3 Choice of authentication approach --
5.4 Threshold with random access --
5.4.1 Authentication with Merkle hash trees --
5.4.2 Authentication with chain Merkle hash trees --
5.5 Threshold with no random access --
5.6 Summary. 6. Data streams --
6.1 Data stream model --
6.2 Tumbling Merkle tree --
6.2.1 TM-tree construction --
6.2.2 One-shot selection queries --
6.2.3 Sliding window selection queries --
6.2.4 Aggregation queries --
6.3 Continuous monitoring of Tuples in a selection range --
6.4 Summary. 7. Conclusion --
Bibliography --
Authors' biographies.
Series Title: Synthesis lectures on data management, #24.
Responsibility: HweeHwa Pang, Kian-Lee Tan.

Abstract:

Introduces various notions that the research community has studied for defining the correctness of a query answer. This book presents authentication mechanisms for a wide variety of queries in the  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/779514204> # Query answer authentication
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
   library:oclcnum "779514204" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1081983986#Place/san_rafael_calif> ; # San Rafael, Calif.
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Topic/outsourced_database> ; # Outsourced database
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Thing/correctness_of_query_answer> ; # correctness of query answer
   schema:about <http://dewey.info/class/005.8/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_security_general> ; # COMPUTERS--Security--General
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Thing/data_integrity> ; # data integrity
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Thing/database_security> ; # database security
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
   schema:about <http://id.worldcat.org/fast/888063> ; # Database security
   schema:about <http://id.worldcat.org/fast/1746571> ; # Data integrity
   schema:about <http://id.worldcat.org/fast/1739127> ; # Querying (Computer science)
   schema:about <http://experiment.worldcat.org/entity/work/data/1081983986#Thing/outsourced_database> ; # outsourced database
   schema:bookFormat schema:EBook ;
   schema:contributor <http://viaf.org/viaf/19904621> ; # Kian-Lee Tan
   schema:copyrightYear "2012" ;
   schema:creator <http://viaf.org/viaf/232736402> ; # HweeHwa Pang
   schema:datePublished "2012" ;
   schema:description "In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties."@en ;
   schema:description "1. Introduction -- 1.1 System and threat models -- 1.2 Cost factors -- 1.3 Organization."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1081983986> ;
   schema:genre "Electronic books"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1081983986#Series/synthesis_lectures_on_data_management> ; # Synthesis lectures on data management ;
   schema:isPartOf <http://worldcat.org/issn/2153-5426> ; # Synthesis lectures on data management,
   schema:isSimilarTo <http://www.worldcat.org/oclc/778067537> ;
   schema:name "Query answer authentication"@en ;
   schema:productID "779514204" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/779514204#PublicationEvent/san_rafael_calif_morgan_&_claypool_publishers_2012> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/1081983986#Agent/morgan_&_claypool_publishers> ; # Morgan & Claypool Publishers
   schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=440536> ;
   schema:url <http://proquest.safaribooksonline.com/?fpi=9781608457656> ;
   schema:url <http://site.ebrary.com/id/10570927> ;
   schema:url <http://www.morganclaypool.com/doi/abs/10.2200/S00405ED1V01Y201202DTM024> ;
   schema:url <http://uri.idm.oclc.org/login?url=http://dx.doi.org/10.2200/S00405ED1V01Y201202DTM024> ;
   schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=881281> ;
   schema:url <http://www.morganclaypool.com/doi/pdf/10.2200/S00405ED1V01Y201202DTM024> ;
   schema:workExample <http://dx.doi.org/10.2200/S00405ED1V01Y201202DTM024> ;
   schema:workExample <http://worldcat.org/isbn/9781608457663> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/779514204> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1081983986#Agent/morgan_&_claypool_publishers> # Morgan & Claypool Publishers
    a bgn:Agent ;
   schema:name "Morgan & Claypool Publishers" ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Place/san_rafael_calif> # San Rafael, Calif.
    a schema:Place ;
   schema:name "San Rafael, Calif." ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Series/synthesis_lectures_on_data_management> # Synthesis lectures on data management ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/779514204> ; # Query answer authentication
   schema:name "Synthesis lectures on data management ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Thing/correctness_of_query_answer> # correctness of query answer
    a schema:Thing ;
   schema:name "correctness of query answer" ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Thing/database_security> # database security
    a schema:Thing ;
   schema:name "database security" ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Thing/outsourced_database> # outsourced database
    a schema:Thing ;
   schema:name "outsourced database" ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
   schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
   schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1081983986#Topic/outsourced_database> # Outsourced database
    a schema:Intangible ;
   schema:name "Outsourced database"@en ;
    .

<http://id.worldcat.org/fast/1739127> # Querying (Computer science)
    a schema:Intangible ;
   schema:name "Querying (Computer science)"@en ;
    .

<http://id.worldcat.org/fast/1746571> # Data integrity
    a schema:Intangible ;
   schema:name "Data integrity"@en ;
    .

<http://id.worldcat.org/fast/888063> # Database security
    a schema:Intangible ;
   schema:name "Database security"@en ;
    .

<http://viaf.org/viaf/19904621> # Kian-Lee Tan
    a schema:Person ;
   schema:familyName "Tan" ;
   schema:givenName "Kian-Lee" ;
   schema:name "Kian-Lee Tan" ;
    .

<http://viaf.org/viaf/232736402> # HweeHwa Pang
    a schema:Person ;
   schema:familyName "Pang" ;
   schema:givenName "HweeHwa" ;
   schema:name "HweeHwa Pang" ;
    .

<http://worldcat.org/isbn/9781608457663>
    a schema:ProductModel ;
   schema:isbn "1608457664" ;
   schema:isbn "9781608457663" ;
    .

<http://worldcat.org/issn/2153-5426> # Synthesis lectures on data management,
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/779514204> ; # Query answer authentication
   schema:issn "2153-5426" ;
   schema:name "Synthesis lectures on data management," ;
    .

<http://www.worldcat.org/oclc/778067537>
    a schema:CreativeWork ;
   rdfs:label "Query answer authentication." ;
   schema:description "Print version:" ;
   schema:isSimilarTo <http://www.worldcat.org/oclc/779514204> ; # Query answer authentication
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.