Authenticated relational tables and authenticated skip lists

  • Authors:
  • Giuseppe Di Battista;Bernardo Palazzi

  • Affiliations:
  • Roma TRE University, Rome, Italy;Roma TRE University, Rome, Italy and ISCOM Italian Ministry of Communication, Rome, Italy and Brown University, Department of Computer Science, Providence, RI

  • Venue:
  • Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a general method, based on the usage of typical DBMS primitives, for maintaining authenticated relational tables. The authentication process is managed by an application external to the DBMS, that stores just one hash information of the authentication structure. The method exploits techniques to represent hierarchical data structures into relational tables and queries that allow an efficient selection of the elements needed for authentication.