Joe Celko´sCelko´s Trees and Hierarchies in SQL for Smarties, 2004. ,
Bigtable, ACM Transactions on Computer Systems, vol.26, issue.2, pp.1-4, 2008. ,
DOI : 10.1145/1365815.1365816
Authentic data publication over the Internet1, Journal of Computer Security, vol.11, issue.3, pp.291-314, 2003. ,
DOI : 10.3233/JCS-2003-11302
Authentic Third-Party Data Publication, Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions, pp.101-112, 2001. ,
DOI : 10.1007/0-306-47008-X_9
URL : http://castle.cs.ucdavis.edu/~devanbu/files/dbsec.pdf
Authenticated relational tables and authenticated skip lists, Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, pp.31-46, 2007. ,
Efficient authenticated dictionaries with skip lists and commutative hashing, 2001. ,
DOI : 10.1109/discex.2001.932160
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.2282
Super-Efficient Verification of Dynamic Outsourced Databases, Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology, CT-RSA'08, pp.407-424, 2008. ,
DOI : 10.1007/978-3-540-79263-5_26
Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, pp.121-132, 2006. ,
DOI : 10.1145/1142473.1142488
Efficient certificate revocation, 1996. ,
Implementing a Tamper-Evident Database System, Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web, ASIAN'05, pp.28-48, 2005. ,
DOI : 10.1007/11596370_5
Partially materialized digest scheme: an efficient verification method for outsourced databases, The VLDB Journal, vol.21, issue.2, pp.363-381, 2009. ,
DOI : 10.1007/s00778-008-0108-z
Authentication and integrity in outsourced databases, ACM Transactions on Storage, vol.2, issue.2, pp.107-138, 2006. ,
DOI : 10.1145/1149976.1149977
Authentication of Outsourced Databases Using Signature Aggregation and Chaining, International Conference on Database Systems for Advanced Applications (DASFAA, pp.420-436, 2006. ,
DOI : 10.1007/11733836_30
Query Racing: Fast Completeness Certification of Query Results, Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, pp.177-192, 2010. ,
DOI : 10.1007/978-3-642-13739-6_12
URL : https://hal.archives-ouvertes.fr/hal-01056689
Verifying completeness of relational query results in data publishing, Proceedings of the 2005 ACM SIGMOD international conference on Management of data , SIGMOD '05, pp.407-418, 2005. ,
DOI : 10.1145/1066157.1066204
Authenticating query results in edge computing, Proceedings. 20th International Conference on Data Engineering, p.560, 2004. ,
DOI : 10.1109/ICDE.2004.1320027
Scalable verification for outsourced dynamic databases, Proc. VLDB Endow, pp.802-813, 2009. ,
DOI : 10.14778/1687627.1687718
Database as a service: A marketplace assessment, 2012. ,
Query execution assurance for outsourced databases, Proceedings of the 31st international conference on Very large data bases, VLDB '05, pp.601-612, 2005. ,
Nested intervals tree encoding in SQL, ACM SIGMOD Record, vol.34, issue.2, pp.47-52, 2005. ,
DOI : 10.1145/1083784.1083793
Practical Integrity Assurance for Big Data Processing Deployed over Open Cloud, 2013. ,
iBigTable, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, 2013. ,
DOI : 10.1145/2435349.2435399
Integrity auditing of outsourced data, Proceedings of the 33rd international conference on Very large data bases, VLDB '07, pp.782-793, 2007. ,
Providing freshness guarantees for outsourced databases, Proceedings of the 11th international conference on Extending database technology Advances in database technology, EDBT '08, pp.323-332, 2008. ,
DOI : 10.1145/1353343.1353384