45
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

External and Distributed Databases: Efficient and Secure XML Query Assurance

, &
Pages 421-433 | Received 02 Mar 2011, Accepted 14 Feb 2012, Published online: 28 May 2012

References

  • A. Clarke and R. Steele , “ Secure and reliable distributed health records: Achieving query assurance across repositories of encrypted health data ,” in HICSS , IEEE Computer Society , 2012 .
  • R. Steele , W. Gardner , D. Chandra , and T. S. Dillon , “ Framework and prototype for a secure xml-based electronic health records system ,” IJEH , vol. 3 , no. 2 , pp. 151 – 174 , 2007 .
  • M. Xiey , H. Wang , J. Yin , and X. Meng , “ Providing freshness guarantees for outsourced databases ,” in Proceedings of the 11th international conference on Extending database technology: Advances in database technology ,pp. 323 – 332 , 2008 vol. 261 .
  • Nguyen , V. H. and Dang , T. K. 2008 . A novel solution to query assurance verification for dynamic outsourced xml databases . Journal of Software , 3 ( 4 ) : 9 – 16 .
  • Mouratidis , K. , Sacharidis , D. and Pang , H. 2009 . Partially materialized digest scheme: an efficient verification method for outsourced databases . Very Large Data Base , 18 ( 1 ) : 363 – 381 .
  • A. Clarke and E. Pardede , “ Outsourced xml database: Query assurance optimization ,” in AINA , pp. 1181 – 1188 , IEEE Computer Society , 2010 .
  • S. Schmidt , R. Steele , T. S. Dillon , and E. Chang , “ Building a fuzzy trust network in unsupervised multiagent environments ,” in OTM Workshops, vol. 3762 of Lecture Notes in Computer Science , pp. 816 – 825 , Springer , 2005 .
  • M. Czapski and R. Steele , “ Strengthening privacy and confidentiality protection for electronic health records ,” in Web Technologies, Applications, and Services Hamza M. H. , pp. 35 – 40 , IASTED/ACTA Press , 2005 .
  • Einar Mykletun , G. T. and Narasimha , Maithili . 2006 . Authentication and integrity in outsourced databases . ACM Transactions on Storage (TOS) , 2 ( 2 ) : 107 – 138 .
  • P. T. Devanbu , M. Gertz , C. U. Martel , and S. G. Stubblebine , “ Authentic third-party data publication ,” in Database Security , pp. 101 – 112 , 2000 .
  • M. Narasimha and G. Tsudik , “ Authentication of outsourced databases using signature aggregation and chaining ,” in Lecture Notes in Computer Science 3882 , pp. 420 – 436 , 2006 .
  • F. Li , M. Hadjieleftheriou , G. Kollios , and L. Reyzin , “ Dynamic authenticated index structures for outsourced databases ,” in Special Interest Group on Management Of Data Conference S. Chaudhuri , V. Hristidis , and N. Polyzotis , pp. 121 – 132 , ACM , 2006 .
  • Wang , H. , Yin , J. , Perng , C.-S. and Yu , P. S. 2008 . “ Dual encryption for query integrity assurance ” . In Conference on Information and Knowledge Management , Edited by: Shanahan , J. G. , Amer-Yahia , S. , Manolescu , I. , Zhang , Y. , Evans , D. A. , Kolcz , A. , Choi , K.-S. and Chowdhury , A. ACM .
  • P. van Liesdonk , S. Sedghi , J. Doumen , P. H. Hartel , and W. Jonker , “ Computationally efficient searchable symmetric encryption ,” in Secure Data Management W. Jonker and M. Petkovic , vol. 6358 of Lecture Notes in Computer Science , pp. 87 – 100 , Springer , 2010 .
  • Jeong , I. R. , Kwon , J. O. , Hong , D. and Lee , D. H. 2009 . Searchable encryption with keyword-recoverability . IEICE Transactions , 92-D ( 5 ) : 1200 – 1203 .
  • Rhee , H. S. , Park , J. H. , Susilo , W. and Lee , D. H. 2010 . Trapdoor security in a searchable public-key encryption scheme with a designated tester . Journal of Systems and Software , 83 ( 5 ) : 763 – 771 .
  • “Apache xindice.” http://xml.apache.org/xindice/ , 2009 .
  • “Sample dataset – cia factbook: Country data.” http://www.dbis.informatik.unigoettingen.de/lopix/lopix-mondial.html , 2009 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.