Security Against Compromised Servers: Verifiable DB Queries.
Muhammad Waheed AkramMuhammad ZaidNaveed AhmedShahzad SaleemPublished in: FIT (2019)
Keyphrases
- statistical databases
- query language
- database
- query processing
- access control
- query evaluation
- range queries
- network security
- web search engines
- complex queries
- information security
- intrusion detection
- sufficient conditions
- query formulation
- response time
- efficient processing
- databases
- query logs
- security policies
- database queries
- multi dimensional
- search engine
- security issues
- security mechanisms