2004
DOI: 10.1109/tkde.2004.63
|View full text |Cite
|
Sign up to set email alerts
|

Selective and authentic third-party distribution of XML documents

Abstract: Third-party architectures for data publishing over the Internet today are receiving growing attention, due to their scalability properties and to the ability of efficiently managing large number of subjects and great amount of data. In a third-party architecture, there is a distinction between the Owner and the Publisher of information. The Owner is the producer of information, whereas Publishers are responsible for managing (a portion of) the Owner information and for answering subject queries. A relevant iss… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0

Year Published

2004
2004
2013
2013

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 112 publications
(57 citation statements)
references
References 13 publications
0
57
0
Order By: Relevance
“…Secure content based pub/sub systems: Privacy and confidentiality issues in pub/sub systems have long been identified [28], but little progress has been made to address these issues in a holistic manner. Most of prior work on data confidentiality techniques in the context of content based pub/sub systems is based on the assumption that brokers are trusted with respect to the privacy of the subscriptions by subscribers [2,27,16]. However, when such an assumption does not hold, both publication confidentiality and subscription privacy are at risk.…”
Section: Results Discussionmentioning
confidence: 99%
“…Secure content based pub/sub systems: Privacy and confidentiality issues in pub/sub systems have long been identified [28], but little progress has been made to address these issues in a holistic manner. Most of prior work on data confidentiality techniques in the context of content based pub/sub systems is based on the assumption that brokers are trusted with respect to the privacy of the subscriptions by subscribers [2,27,16]. However, when such an assumption does not hold, both publication confidentiality and subscription privacy are at risk.…”
Section: Results Discussionmentioning
confidence: 99%
“…The first methods on authentication of outsourced databases belong to the first category and build upon the MHT (e.g. [8,20,2]). [13] proposed the most complete and efficient MHT-based method to date, called Embedded Merkle B-tree (EMB-tree).…”
Section: Related Workmentioning
confidence: 99%
“…With the chain-MHT, the VO for a query result contains the signature of every query term's inverted list 2 . When the query processing algorithm terminates, all the processed document identifiers in the inverted lists of the query terms are also added to the VO.…”
Section: Authentication With Chain Merkle Hash Treesmentioning
confidence: 99%
“…Devanbu, et al described authentication for queries on XML document collections in [5]. Bertino, et al focus in detail on XML documents in [3] and leverage access control mechanisms as a means of providing client proofs of completeness. They also expand supported query types and provide a detailed investigation of XML authentication issues including updates, and address important implementation issues.…”
Section: Related Workmentioning
confidence: 99%