{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:26Z","timestamp":1725562766369},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_12","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"177-192","source":"Crossref","is-referenced-by-count":10,"title":["Query Racing: Fast Completeness Certification of Query Results"],"prefix":"10.1007","author":[{"given":"Bernardo","family":"Palazzi","sequence":"first","affiliation":[]},{"given":"Maurizio","family":"Pizzonia","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Pucacco","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Gertz, M., Martel, C.U., Stubblebine, S.G.: Authentic third-party data publication. In: DBSEC, pp. 101\u2013112 (2001)","DOI":"10.1007\/0-306-47008-X_9"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Di Battista, G., Palazzi, B.: Authenticated relational tables and authenticated skip lists. In: DBSEC, pp. 31\u201346 (2007)","DOI":"10.1007\/978-3-540-73538-0_3"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: ASIAN: 10th Asian Computing Science Conference, pp. 28\u201348 (2005)","DOI":"10.1007\/11596370_5"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: SIGMOD Conf., pp. 407\u2013418 (2005)","DOI":"10.1145\/1066157.1066204"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Pang, H., Tan, K.L.: Authenticating query results in edge computing. In: Proc. of the 20th Int. Conference on Data Engineering, pp. 560\u2013571 (2004)","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"12_CR6","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: VLDB, pp. 782\u2013793 (2007)"},{"key":"12_CR7","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/1353343.1353384","volume-title":"EDBT","author":"M. Xie","year":"2008","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: EDBT, pp. 323\u2013332. ACM, New York (2008)"},{"issue":"2","key":"12_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E. Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. Trans. Storage\u00a02(2), 107\u2013138 (2006)","journal-title":"Trans. Storage"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-540-39658-1_2","volume-title":"Algorithms - ESA 2003","author":"R. Tamassia","year":"2003","unstructured":"Tamassia, R.: Authenticated data structures. In: Di Battista, G., Zwick, U. (eds.) ESA 2003. LNCS, vol.\u00a02832, pp. 2\u20135. Springer, Heidelberg (2003)"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO 1989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Goodrich, M.T., Tamassia, R., Schwerin, A.: Implementation of an authenticated dictionary with skip lists and commutative hashing. In: Proc. DISCEX II, pp. 68\u201382 (2001)","DOI":"10.1109\/DISCEX.2001.932160"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Buldas, A., Roos, M., Willemson, J.: Undeniable replies for database queries. In: Proc. Intern. Baltic Conf. on DB and IS, vol.\u00a02, pp. 215\u2013226 (2002)","DOI":"10.1007\/978-94-015-9978-8_4"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-79263-5_26","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"M.T. Goodrich","year":"2008","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 407\u2013424. Springer, Heidelberg (2008)"},{"issue":"3","key":"12_CR14","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the Internet. Journal of Computer Security\u00a011(3), 291\u2013314 (2003)","journal-title":"Journal of Computer Security"},{"key":"12_CR15","first-page":"476","volume-title":"EDBT 2008","author":"S. Singh","year":"2008","unstructured":"Singh, S., Prabhakar, S.: Ensuring correctness over untrusted private database. In: EDBT 2008, pp. 476\u2013486. ACM, New York (2008)"},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/1559845.1559849","volume-title":"SIGMOD 2009","author":"Y. Yang","year":"2009","unstructured":"Yang, Y., Papadias, D., Papadopoulos, S., Kalnis, P.: Authenticated join processing in outsourced databases. In: SIGMOD 2009, pp. 5\u201318. ACM, New York (2009)"},{"issue":"1","key":"12_CR17","first-page":"49","volume":"2","author":"Y. Zhou","year":"2009","unstructured":"Zhou, Y., Salehi, A., Aberer, K.: Scalable delivery of stream query results. PVLDB\u00a02(1), 49\u201360 (2009)","journal-title":"PVLDB"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013, 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Cheng, W., Tan, K.: Authenticating knn query results in data publishing. In: Proc. 4th Int. Workshop on Secure Data Management, pp. 47\u201363 (2007)","DOI":"10.1007\/978-3-540-75248-6_4"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: ACM SIGMOD, pp. 121\u2013132 (2006)","DOI":"10.1145\/1142473.1142488"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Dang, T.K.: Ensuring correctness, completeness, and freshness for outsourced tree-indexed data. Information Resources Management Jrnl., 59\u201376 (2008)","DOI":"10.4018\/irmj.2008010104"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11733836_30","volume-title":"Database Systems for Advanced Applications","author":"M. Narasimha","year":"2006","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882, pp. 420\u2013436. Springer, Heidelberg (2006)"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: ICDE, pp. 1082\u20131091 (2008)","DOI":"10.1109\/ICDE.2008.4497517"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Polivy, D.J., Tamassia, R.: Authenticating distributed data using Web services and XML signatures. In: Proc. ACM Workshop on XML Security (2002)","DOI":"10.1145\/764792.764805"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Pugh, W.: Skip lists: A probabilistic alternative to balanced trees. In: Workshop on Algorithms and Data Structures, pp. 437\u2013449 (1989)","DOI":"10.1007\/3-540-51542-9_36"},{"key":"12_CR26","unstructured":"UCI Machine Learning Repository, University of California, Irvine, School of Information and Computer Sciences (2007), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:42:28Z","timestamp":1606167748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}