Sciweavers

64 search results - page 3 / 13
» Database auditing
Sort
View
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
14 years 19 days ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
EDBT
2010
ACM
127views Database» more  EDBT 2010»
14 years 5 months ago
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention
Relational databases are periodically vacuumed to remove tuples that have expired. During the discovery phase of litigation, plaintiffs ask defendants for access to information re...
Ragib Hasan, Marianne Winslett