We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication. -
DI BATTISTA, G., Bernardo, P. (2007). Authenticated Relational Tables and Authenticated Skip Lists. In 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'07) (pp.31-46). BERLIN : SPRINGER-VERLAG.
Authenticated Relational Tables and Authenticated Skip Lists
DI BATTISTA, Giuseppe;
2007-01-01
Abstract
We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication. -I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.