14 resultados para G7824.B4 1865 .Z5

em Boston University Digital Common


Relevância:

20.00% 20.00%

Publicador:

Resumo:

http://www.archive.org/details/hawaiianislandsa00peabiala

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Handwritten 1865 handwritten letter from Daniel D. Whedon to Daniel A. Whedon, his nephew, regarding slavery in relation to the Church as well as the Christian Union.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/a592254601marsuoft

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/conquestofcontin00burluoft

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://moa.umdl.umich.edu/cgi/sgml/moa-idx?notisid=ALQ8090

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/anorientallandof00freeuoft

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/missionabnaquise00bigorich

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/cooperationandth009506mbp

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/thesaenkhyaaphor00kapiuoft

Relevância:

10.00% 10.00%

Publicador:

Resumo:

http://www.archive.org/details/clearsunshineofg00sheprich

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to access and query the data more efficiently. As servers might be untrusted or can be compromised, query authentication becomes an essential component of ODB systems. Existing solutions for this problem concentrate mostly on static scenarios and are based on idealistic properties for certain cryptographic primitives. In this work, first we define a variety of essential and practical cost metrics associated with ODB systems. Then, we analytically evaluate a number of different approaches, in search for a solution that best leverages all metrics. Most importantly, we look at solutions that can handle dynamic scenarios, where owners periodically update the data residing at the servers. Finally, we discuss query freshness, a new dimension in data authentication that has not been explored before. A comprehensive experimental evaluation of the proposed and existing approaches is used to validate the analytical models and verify our claims. Our findings exhibit that the proposed solutions improve performance substantially over existing approaches, both for static and dynamic environments.