2007
DOI: 10.1007/978-3-540-73538-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Relational Tables and Authenticated Skip Lists

Abstract: Abstract. We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(20 citation statements)
references
References 21 publications
(31 reference statements)
0
20
0
Order By: Relevance
“…Another authenticated structure that can be used to verify the integrity of queries searching for a key value in a set of elements is represented by skip lists [33]. A skip list for a set S of distinct key values is a set of lists S 0 , S 1 , .…”
Section: Deterministic Approachesmentioning
confidence: 99%
“…Another authenticated structure that can be used to verify the integrity of queries searching for a key value in a set of elements is represented by skip lists [33]. A skip list for a set S of distinct key values is a set of lists S 0 , S 1 , .…”
Section: Deterministic Approachesmentioning
confidence: 99%
“…Li et al [20] propose to transform B-trees, used by DBMS for indexes, into an ADS, hence requiring support from the DBMS itself. The problem of efficiently storing ADSes into a regular DBMS has been studied by Miklau and Suciu [3] for Merkle trees and by Di Battista and Palazzi [2] for authenticated skip lists.…”
Section: State Of the Artmentioning
confidence: 99%
“…We introduce, for each attribute a of T , a security table S a . Each security table represents an authenticated skip list (see Section 3) that allows the client to easily certify completeness and integrity of the result of monodimensional basic queries in canonical form on a using the techniques described in [2]. Given a monodimensional canonical basic We are now ready to introduce the query race technique.…”
Section: Completeness Certification For Multidimensional Basic Queriesmentioning
confidence: 99%
See 2 more Smart Citations