Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers.
Yves DeswarteJean-Jacques QuisquaterAyda SaïdanePublished in: IICIS (2003)
Keyphrases
- integrity checking
- integrity constraints
- database
- deductive databases
- remote server
- hard and soft constraints
- databases
- semantic query optimization
- third party
- wide area network
- trust model
- constraint logic programming
- metadata
- privacy preserving
- xml documents
- file system
- expert systems
- security policies
- private information
- privacy concerns
- database systems