Cited By
View all- Yan HCheng XSu SZhang S(2017)Authenticated Location-Aware Publish/Subscribe Services in Untrusted Outsourced EnvironmentsSecurity and Communication Networks10.1155/2017/42154252017(1-15)Online publication date: 2017
We consider a stream outsourcing setting, where a data owner delegates the management of a set of disjoint data streams to an untrusted server. The owner authenticates his streams via signatures. The server processes continuous queries on the union of ...
When outsourced database owners delegate their data to service providers, which might be untrusted or compromised, two issues of data security emerge, including data confidentiality and data integrity. Most of the previous research focuses on only one ...
Query authentication has been extensively studied to ensure the integrity of query results for outsourced databases, which are often not fully trusted. However, access control, another important security concern, is largely ignored by existing works. ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in