|
Showing 1 - 2 of
2 matches in All Departments
In data publishing, the owner delegates the role of satisfying user
queries to a third-party publisher. As the servers of the publisher
may be untrusted or susceptible to attacks, we cannot assume that
they would always process queries correctly, hence there is a need
for users to authenticate their query answers. This book introduces
various notions that the research community has studied for
defining the correctness of a query answer. In particular, it is
important to guarantee the completeness, authenticity and
minimality of the answer, as well as its freshness. We present
authentication mechanisms for a wide variety of queries in the
context of relational and spatial databases, text retrieval, and
data streams. We also explain the cryptographic protocols from
which the authentication mechanisms derive their security
properties. Table of Contents: Introduction / Cryptography
Foundation / Relational Queries / Spatial Queries / Text Search
Queries / Data Streams / Conclusion
|
Information Security Practice and Experience - First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings (Paperback, 2005 ed.)
Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou
|
R1,562
Discovery Miles 15 620
|
Ships in 10 - 15 working days
|
The inaugural Information Security Practice and Experience
Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As
applications of information security technologies become pervasive,
- sues pertaining to their deployment and operation are becoming
increasingly important. ISPEC is intended to be an annual
conference that brings together researchers and practitioners to
provide a con?uence of new information se- rity technologies, their
applications and their integration with IT systems in various
vertical sectors. The Program Committee consisted of leading
experts in the areas of information security, information systems,
and domain experts in applications of IT in vertical business
segments. The topics of the conference covered security
applications and case studies, access control, network security,
data security, secure architectures, and cryp- graphic techniques.
Emphasis was placed on the application of security research to meet
practical user requirements, both in the paper selection process
and in the invited speeches. Acceptance into the conference
proceedings was very competitive. The Call for Papers attracted
more than 120 submissions, out of which the Program Committee
selected only 35 papers for inclusion in the proceedings.
Thisconferencewasmadepossibleonlythroughthecontributionsfrommany
individuals and organizations. We would like to thank all the
authors who s- mitted papers. We also gratefully acknowledge the
members of the Program Committee and the external reviewers, for
the time and e?ort they put into reviewing the submissions. Special
thanks are due to Ying Qiu for managing the website for paper s-
mission,
reviewandnoti?cation.PatriciaLohwaskindenoughtoarrangeforthe
conference venue, and took care of the administration in running
the conference
|
|