Query Answer Authentication

Query Answer Authentication

HweeHwa Pang, Tan Kian-Lee
ISBN: 9781608457656 | PDF ISBN: 9781608457663
Copyright © 2012 | 103 Pages | Publication Date: 01/01/2012

BEFORE YOU ORDER: You may have Academic or Corporate access to this title. Click here to find out: 10.2200/S00405ED1V01Y201202DTM024

Ordering Options: Paperback $30.00   E-book $24.00   Paperback & E-book Combo $37.50


Why pay full price? Members receive 15% off all orders.
Learn More Here

Read Our Digital Content License Agreement (pop-up)

Purchasing Options:



In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers.

This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties.

Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

Table of Contents

Introduction
Cryptography Foundation
Relational Queries
Spatial Queries
Text Search Queries
Data Streams
Conclusion

About the Author(s)

HweeHwa Pang, Singapore Management University

Tan Kian-Lee, National University of Singapore

Related Series

Data Mining and Knowledge Discovery

Reviews

Query response authentication focuses on defining the correctness of a query’s answer. It considers the query response in terms of completeness and authenticity, among other things. For example, a query response about the research of a particular climate scientist should provide a complete listing of the scientist's work, and the response should be similar to what would be given by the scientist himself. Pang and Tan have put together a sound and thorough discussion of query response authentication. The book is well organized and flows nicely. I found it easy to follow. To a large degree, the authors bring a quality management focus to query processing and authentication, highlighting several emerging trends that are worth pursuing. Query execution assurance, queries with encrypted data, and data publishing models are examined...the authors have provided an excellent bibliography on the topic. Their diagrams are easy to follow and appropriately placed. This is a good publication for researchers and teachers of database management and query techniques.
Robert M. Lynch - ACM Computing Reviews

Reviews (1)
Browse by Subject
Case Studies in Engineering
ACM Books
IOP Concise Physics
SEM Books
0 items
LATEST NEWS

Newsletter
Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: