Description

Book Synopsis
In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

Table of Contents
Introduction.- Cryptography Foundation.- Relational Queries.- Spatial Queries.- Text Search Queries.- Data Streams.- Conclusion.

Query Answer Authentication

Product form

£26.59

Includes FREE delivery

RRP £27.99 – you save £1.40 (5%)

Order before 4pm today for delivery by Tue 13 Jan 2026.

A Paperback by HweeHwa Pang, Kian-Lee Tan

1 in stock


    View other formats and editions of Query Answer Authentication by HweeHwa Pang

    Publisher: Springer International Publishing AG
    Publication Date: 01/04/2012
    ISBN13: 9783031007590, 978-3031007590
    ISBN10: 303100759X

    Description

    Book Synopsis
    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

    Table of Contents
    Introduction.- Cryptography Foundation.- Relational Queries.- Spatial Queries.- Text Search Queries.- Data Streams.- Conclusion.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account