CẢI TIẾN XÁC THỰC SKIP LIST TRONG TỐI ƯU HÓA TRUY VẤN QUAN HỆ
Thông tin bài báo
Ngày nhận bài: 21/11/24                Ngày hoàn thiện: 19/12/24                Ngày đăng: 19/12/24Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] S. Artzi, K. A. Ross, and R. Secord, “Skip list-based algorithms for distributed databases,” Journal of Parallel and Distributed Computing, vol. 59, no.1, pp. 111-136, 1999.
[2] X. Feng and M. Wang, “Secure indexing scheme for outsourced databases with skip lists,” in Proceedings of the International Conference on Information Security and Cryptology, 2007, pp. 67-79.
[3] Y. Li, Y. Zhang, and J. Chen, “An efficient authentication scheme for outsourced databases based on skip list,” in Proceedings of the International Conference on Computational Science and Engineering, 2012, pp. 355-360.
[4] Y. Wu, D. Li, and S. Wang, “An efficient and secure authentication scheme for outsourced databases based on skip list,” Security and Communication Networks, vol. 9, no. 10, pp. 1323-1332, 2016.
[5] Y. Zhang, Y. Li, and J. Chen, “An efficient and scalable authentication scheme for outsourced databases based on skip list,” Journal of Network and Computer Applications, vol. 39, pp. 315-324, 2014.
[6] C. Chen and P. Wang, “Research on the skip list-based indexing method for relational databases,” in Proceedings of the International Conference on Digital Manufacturing and Automation, 2011, pp. 464-467.
[7] A. Aris, T. G. Michael, and T. Roberto, “Persistent Authenticated Dictionaries and Their Applications,” in Information Security. ISC 2001. Lecture Notes in Computer Science, vol. 2200, Berlin, Heidelberg: Springer, 2001, pp. 379–393.
[8] Y. Li, Y. Zhang, and J. Chen, “An enhanced authentication scheme for outsourced databases based on skip list,” Security and Communication Networks, vol. 6, no. 4, pp. 485-494, 2013.
[9] F. Hou, D. Gu, N. Xiao, F. Liu, and H. He, “Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection,” in International Conference on Networking, Architecture, and Storage, 2009, pp. 51–56.
[10] P. Raju, R. Kadekodi, V. Chidambaram, and I. Abraham, “PebblesDB: Building Key-Value Stores using Fragmented Log-Structured Merge Trees,” in Proceedings of the 26th ACM Symposium on Operating Systems Principles, 2017, pp. 497-514.
[11] X. Chen, J. Liu, and Z. Cai, “Efficient query processing in distributed databases using skip list,” in Proceedings of the International Conference on Intelligent Computing and Internet of Things, 2015, pp. 185-192.
[12] F. Duan, J. Li, and J. Lu, “A novel indexing method based on skip list for relational databases,” Journal of Intelligent and Fuzzy Systems, vol. 36, no. 3, pp. 2011-2021, 2019.
[13] Z. Liu and S. Xu, “An improved skip list indexing method for relational databases,” Journal of Computational Information Systems, vol.14, no. 1, pp. 285-292, 2018.
[14] J. Xu, Z. Cao, Q. Xiao, and F. Zhou, “An Improved Authenticated Skip List for Relational Query Authentication,” 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications, 2014, pp. 229-232.
[15] G. Miklau and D. Suciu, "A Formal Approach to Securing Data Provenance," ACM Transactions on Database Systems (TODS), vol. 28, no. 3, pp. 317-360, 2003.
[16] A. Buldas, "Efficient and Flexible Authentication of Data Structures," Journal of Cryptology, vol. 18, no. 4, pp. 300-334, 2005.
[17] G. D. Battista and B. Palazzi, “Authenticated Relational Tables and Authenticated Skip Lists,” in Data and Applications Security XXI. DBSec 2007. Lecture Notes in Computer Science, vol. 4602. Berlin, Heidelberg: Springer, 2007, pp. 31-46.
DOI: https://doi.org/10.34238/tnu-jst.11580
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu





