Entry Li:2010:AIS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Li:2010:AIS,
  author =       "Feifei Li and Marios Hadjieleftheriou and George
                 Kollios and Leonid Reyzin",
  title =        "Authenticated Index Structures for Aggregation
                 Queries",
  journal =      j-TISSEC,
  volume =       "13",
  number =       "4",
  pages =        "32:1--32:??",
  month =        dec,
  year =         "2010",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1880022.1880026",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Wed Jan 12 17:10:07 MST 2011",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Query authentication is an essential component in
                 Outsourced DataBase (ODB) systems. This article
                 introduces efficient index structures for
                 authenticating aggregation queries over large datasets.
                 First, we design an index that features good
                 performance characteristics for static environments.
                 Then, we propose more involved structures for the
                 dynamic case. Our structures feature excellent
                 performance for authenticating queries with multiple
                 aggregate attributes and multiple selection predicates.
                 Furthermore, our techniques cover a large number of
                 aggregate types, including distributive aggregates
                 (such as SUM, COUNT, MIN, and MAX), algebraic
                 aggregates (such as the AVG), and holistic aggregates
                 (such as MEDIAN and QUANTILE). We have also addressed
                 the issue of authenticating aggregation queries
                 efficiently when the database is encrypted to protect
                 data confidentiality.",
  acknowledgement = ack-nhfb,
  articleno =    "32",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries