{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T20:25:28Z","timestamp":1767903928407,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662439357","type":"print"},{"value":"9783662439364","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43936-4_1","type":"book-chapter","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T08:05:04Z","timestamp":1403856304000},"page":"1-16","source":"Crossref","is-referenced-by-count":4,"title":["Integrity Assurance for Outsourced Databases without DBMS Modification"],"prefix":"10.1007","author":[{"given":"Wei","family":"Wei","sequence":"first","affiliation":[]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Hbase, http:\/\/hbase.apache.org\/"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Celko, J.: Joe Celko\u2019s Trees and Hierarchies in SQL for Smarties. Morgan Kaufmann (2004)","DOI":"10.1016\/B978-155860920-4\/50002-7"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: A distributed storage system for structured data. ACM Trans. Comput. Syst.\u00a026, 4:1\u20134:26 (2008)","DOI":"10.1145\/1365815.1365816"},{"key":"1_CR4","doi-asserted-by":"crossref","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P. Devanbu","year":"2003","unstructured":"Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic data publication over the internet. J. Comput. Secur.\u00a011, 291\u2013314 (2003)","journal-title":"J. Comput. Secur."},{"key":"1_CR5","series-title":"IFIP","first-page":"101","volume-title":"Proceedings of the IFIP TC11\/WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions","author":"P.T. Devanbu","year":"2001","unstructured":"Devanbu, P.T., Gertz, M., Martel, C.U., Stubblebine, S.G.: Authentic third-party data publication. In: Thuraisingham, B., van de Riet, R., Dittrich, K.R., Tari, Z. (eds.) Data and Application Security. IFIP, vol.\u00a078, pp. 101\u2013112. Springer, Heidelberg (2001)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-73538-0_3","volume-title":"Data and Applications Security XXI","author":"G. Battista Di","year":"2007","unstructured":"Di Battista, G., Palazzi, B.: Authenticated relational tables and authenticated skip lists. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 31\u201346. Springer, Heidelberg (2007)"},{"key":"1_CR7","unstructured":"Goodrich, M.T., Tamassia, R.: Efficient authenticated dictionaries with skip lists and commutative hashing. Technical report. Johns Hopkins Information Security Institute (2001)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/978-3-540-79263-5_26","volume-title":"Topics in Cryptology \u2013 CT-RSA 2008","author":"M.T. Goodrich","year":"2008","unstructured":"Goodrich, M.T., Tamassia, R., Triandopoulos, N.: Super-efficient verification of dynamic outsourced databases. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol.\u00a04964, pp. 407\u2013424. Springer, Heidelberg (2008)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1142473.1142488","volume-title":"Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD 2006","author":"F. Li","year":"2006","unstructured":"Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD 2006, pp. 121\u2013132. ACM, New York (2006)"},{"key":"1_CR10","unstructured":"Micali, S.: Efficient certificate revocation. Technical report, Cambridge, MA, USA (1996)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/11596370_5","volume-title":"Advances in Computer Science \u2013 ASIAN 2005. Data Management on the Web","author":"G. Miklau","year":"2005","unstructured":"Miklau, G., Suciu, D.: Implementing a tamper-evident database system. In: Grumbach, S., Sui, L., Vianu, V. (eds.) ASIAN 2005. LNCS, vol.\u00a03818, pp. 28\u201348. Springer, Heidelberg (2005)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00778-008-0108-z","volume":"18","author":"K. Mouratidis","year":"2009","unstructured":"Mouratidis, K., Sacharidis, D., Pang, H.: Partially materialized digest scheme: an efficient verification method for outsourced databases. The VLDB Journal\u00a018, 363\u2013381 (2009)","journal-title":"The VLDB Journal"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E. Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. Trans. Storage\u00a02, 107\u2013138 (2006)","journal-title":"Trans. Storage"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11733836_30","volume-title":"Database Systems for Advanced Applications","author":"M. Narasimha","year":"2006","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882, pp. 420\u2013436. Springer, Heidelberg (2006)"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-13739-6_12","volume-title":"Data and Applications Security and Privacy XXIV","author":"B. Palazzi","year":"2010","unstructured":"Palazzi, B., Pizzonia, M., Pucacco, S.: Query racing: fast completeness certification of query results. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol.\u00a06166, pp. 177\u2013192. Springer, Heidelberg (2010)"},{"key":"1_CR16","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1145\/1066157.1066204","volume-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005","author":"H. Pang","year":"2005","unstructured":"Pang, H., Jain, A., Ramamritham, K., Tan, K.-L.: Verifying completeness of relational query results in data publishing. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, pp. 407\u2013418. ACM, New York (2005)"},{"key":"1_CR17","first-page":"560","volume-title":"Proceedings of the 20th International Conference on Data Engineering, ICDE 2004","author":"H. Pang","year":"2004","unstructured":"Pang, H., Tan, K.-L.: Authenticating query results in edge computing. In: Proceedings of the 20th International Conference on Data Engineering, ICDE 2004, pp. 560\u2013571. IEEE Computer Society, Washington, DC (2004)"},{"key":"1_CR18","doi-asserted-by":"crossref","first-page":"802","DOI":"10.14778\/1687627.1687718","volume":"2","author":"H. Pang","year":"2009","unstructured":"Pang, H., Zhang, J., Mouratidis, K.: Scalable verification for outsourced dynamic databases. Proc. VLDB Endow.\u00a02, 802\u2013813 (2009)","journal-title":"Proc. VLDB Endow."},{"key":"1_CR19","unstructured":"Pizzette, L., Cabot, T.: Database as a service: A marketplace assessment (2012)"},{"key":"1_CR20","unstructured":"Sion, R.: Query execution assurance for outsourced databases. In: Proceedings of the 31st International Conference on Very Large Data Bases, VLDB 2005, pp. 601\u2013612. VLDB Endowment (2005)"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/1083784.1083793","volume":"34","author":"V. Tropashko","year":"2005","unstructured":"Tropashko, V.: Nested intervals tree encoding in sql. SIGMOD Rec.\u00a034(2), 47\u201352 (2005)","journal-title":"SIGMOD Rec."},{"key":"1_CR22","unstructured":"Wei, W., Yu, T.: Practical Integrity Assurance for Big Data Processing Deployed over Open Cloud. PhD thesis, North Carolina State University (2013)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Wei, W., Yu, T., Xue, R.: ibigtable: Practical data integrity for bigtable in public cloud. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, CODASPY 2013. ACM (2013)","DOI":"10.1145\/2435349.2435399"},{"key":"1_CR24","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Integrity auditing of outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB 2007, pp. 782\u2013793. VLDB Endowment (2007)"},{"key":"1_CR25","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1145\/1353343.1353384","volume-title":"Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, EDBT 2008","author":"M. Xie","year":"2008","unstructured":"Xie, M., Wang, H., Yin, J., Meng, X.: Providing freshness guarantees for outsourced databases. In: Proceedings of the 11th International Conference on Extending Database Technology: Advances in Database Technology, EDBT 2008, pp. 323\u2013332. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXVIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43936-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,9]],"date-time":"2022-04-09T08:15:42Z","timestamp":1649492142000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43936-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662439357","9783662439364"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43936-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}