Login / Signup
Efficient integrity checking of untrusted network storage.
Alexander Heitzmann
Bernardo Palazzi
Charalampos Papamanthou
Roberto Tamassia
Published in:
StorageSS (2008)
Keyphrases
</>
integrity checking
integrity constraints
databases
hard and soft constraints
privacy preserving
third party
artificial intelligence
deductive databases
expert systems
peer to peer