共 27 条
[11]
Goodrich M., Tamassia R., Schwerin A., Implementation of an authenticated dictionary with skip lists and commutative hashing, Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (DISCEX II), 2001
[12]
Gupta A., Mumick I.S., Maintenance of materialized views: Problems, techniques, and applications, Data Engineering Bulletin, 18, 2, pp. 3-18, (1995)
[13]
Haber S., Stornetta W.S., How to timestamp a digital document, Journal of Cryptology, 3, 2, (1991)
[14]
Jajodia S., Samarati P., Subramanian V.S., Bertino E., A unified framework for enforcing multiple access control policies, Proceedings ACM SIGMOD International Conference on Management of Data, 1997, pp. 474-485
[15]
Kwong A., Gertz M., Authentic publication of XML document data, 2nd International Conference on Web Information Systems Engineering (WISE 01), IEEE Computer Society, 2001, pp. 331-340
[16]
Research Directions in Database Security, (1992)
[17]
Martel C., Nuckolls G., Devanbu P., Gertz M., Kwong A., Stubblebine S., A general model for authenticated data structures, (2001)
[18]
Merkle R.C., A certified digital signature, Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Lecture Notes in Computer Science, 1989, 435, pp. 218-238
[19]
Melton J., Simon A.R., SQL: 1999 - Understanding Relational Language Components, (2001)
[20]
Naor M., Nissim K., Certificate revocation and certificate update, Proceedings of the 7th USENIX Security Symposium, 1998