Große Auswahl an günstigen Büchern
Schnelle Lieferung per Post und DHL

Query Answer Authentication

Über Query Answer Authentication

In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

Mehr anzeigen
  • Sprache:
  • Englisch
  • ISBN:
  • 9783031007590
  • Einband:
  • Taschenbuch
  • Seitenzahl:
  • 104
  • Veröffentlicht:
  • 1 April 2012
  • Abmessungen:
  • 191x7x235 mm.
  • Gewicht:
  • 212 g.
  Versandkostenfrei
  Versandfertig in 1-2 Wochen.

Beschreibung von Query Answer Authentication

In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

Kund*innenbewertungen von Query Answer Authentication



Ähnliche Bücher finden
Das Buch Query Answer Authentication ist in den folgenden Kategorien erhältlich:

Willkommen bei den Tales Buchfreunden und -freundinnen

Jetzt zum Newsletter anmelden und tolle Angebote und Anregungen für Ihre nächste Lektüre erhalten.