Sciweavers

66 search results - page 1 / 14
» Authenticating Query Results in Edge Computing
Sort
View
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
14 years 6 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
AMW
2010
13 years 6 months ago
Certification and Authentication of Data Structures
We study query authentication schemes, algorithmic and cryptographic constructions that provide efficient and secure protocols for verifying the results of queries over structured...
Roberto Tamassia, Nikos Triandopoulos
SIGMOD
2005
ACM
103views Database» more  SIGMOD 2005»
14 years 4 months ago
Verifying Completeness of Relational Query Results in Data Publishing
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produ...
HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian...
GEOS
2007
Springer
13 years 10 months ago
Modeling Spatio-temporal Network Computations: A Summary of Results
Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of...
Betsy George, Shashi Shekhar
ICDE
2011
IEEE
271views Database» more  ICDE 2011»
12 years 8 months ago
Authentication of moving kNN queries
— A moving kNN query continuously reports the k nearest neighbors of a moving query point. In addition to the query result, a service provider that evaluates moving queries often...
Man Lung Yiu, Eric Lo, Duncan Yung