We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication. -

DI BATTISTA, G., Bernardo, P. (2007). Authenticated Relational Tables and Authenticated Skip Lists. In 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'07) (pp.31-46). BERLIN : SPRINGER-VERLAG.

Authenticated Relational Tables and Authenticated Skip Lists

DI BATTISTA, Giuseppe;
2007-01-01

Abstract

We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication. -
2007
978-3-540-73533-5
DI BATTISTA, G., Bernardo, P. (2007). Authenticated Relational Tables and Authenticated Skip Lists. In 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC'07) (pp.31-46). BERLIN : SPRINGER-VERLAG.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/173498
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 24
  • ???jsp.display-item.citation.isi??? 16
social impact