[1] HACIGUMUS H,IYER B,MEHROTRA S.Providing database as a service[C]//Proceedings of the 18th International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2002:29-38. [2] CHEN Qian,HU Haibo,XU Jianliang.Authenticating top-k queries in location-based services with confidentiality[J].Proceedings of the VLDB Endowment,2013,7(1):49-60. [3] CHENG W,TAN K L.Authenticating KNN query results in data publishing[C]//Proceedings of Workshop on Secure Data Management.Berlin,Germany:Springer,2007:47-63. [4] PANG H H,JAIN A,RAMAMRITHAM K,et al.Verifying completeness of relational query results in data publishing[C]//Proceedings of 2005 ACM SIGMOD International Conference on Management of Data.New York,USA:ACM Press,2005:407-418. [5] MERKLE R C.A certified digital signature[C]//Proceedings of Conference on the Theory and Application of Cryptology.Berlin,Germany:Springer,1989:218-238. [6] SU Sen,YAN Han,CHENG Xiang,et al.Authentication of top-k spatial keyword queries in outsourced databases[C]//Proceedings of International Conference on Database Systems for Advanced Applications.Berlin,Germany:Springer,2015:567-588. [7] WU D,CHOI B,XU J,et al.Authentication of moving top-k spatial keyword queries[J].IEEE Transactions on Knowledge and Data Engineering,2014,27(4):922-935. [8] YANG Y,PAPADOPOULOS S,PAPADIAS D,et al.Spatial outsourcing for location-based services[C]//Proceedings of the 24th International Conference on Data Engineering.Washington D.C.,USA:IEEE Press,2008:1082-1091. [9] YANG Y,PAPADOPOULOS S,PAPADIAS D,et al.Authenticated indexing for outsourced spatial databases[J].The VLDB Journal,2009,18(3):631-648. [10] YUAN Duobao,WANG Xiaoming.Query authentication method based on Merkle Hash tree in outsourced database[J].Computer Engineering,2010,36(4):115-117.(in Chinese) 袁多宝,王晓明.基于MH树的外包数据库查询验证方法[J].计算机工程,2010,36(4):115-117. [11] HONG Jun,WEN Tao,YE Zhengwang,et al.Integrity assurance of outsourced spatial database[J].Journal of Northeastern University(Natural Science),2019,40(3):327-333.(in Chinese) 洪军,温涛,叶正旺,等.外包空间数据库的完整性保证机制[J].东北大学学报(自然科学版),2019,40(3):327-333. [12] ZHANG Yanhui,WANG Xiaoming.Improved authentication of queries in outsourced database[J].Computer Engineering and Application,2012,48(6):73-76.(in Chinese)张艳辉,王晓明.一种改进的外包数据库查询验证技术[J].计算机工程与应用,2012,48(6):73-76. [13] ZHANG Yanhui.Research on query and validation technology of outsourcing XML database[D].Guangzhou:Jinan University,2012.(in Chinese)张艳辉.外包XML数据库查询验证技术研究[D].广州:暨南大学,2012. [14] ZHAO Meng,WANG Lei,KUANG Lin'ai,et al.Range query integrity verification based on Merkle Hash tree[J].Journal of Southeast University(Natural Science Edition),2017,47(S1):118-122.(in Chinese)赵蒙,王雷,匡林爱,等.基于Merkle哈希树的范围查询验证技术[J].东南大学学报(自然科学版),2017,47(增刊):118-122. [15] PANG H H,MOURATIDIS K.Authenticating the query results of text search engines[J].Proceedings of the VLDB Endowment,2008,1(1):126-137. [16] WANG Yong,GAO Shimeng,ZHANG Junhao,et al.Authenticating multiple user-defined spatial queries[C]//Proceedings of the 40th Annual Computer Software and Applications Conference.Washington D.C.,USA:IEEE Press,2016:471-480. [17] WANG Yong,DUAN Xiaoran,YANG Xiaodong,et al.Processing multiple-user location-based keyword queries[J].IEICE Transactions on Information and Systems,2018,101(6):1552-1561. [18] DUAN Xiaoran,WANG Yong,CHEN Juguang,et al.Authenticating preference-oriented multiple users spatial queries[C]//Proceedings of the 41st Annual Computer Software and Applications Conference.Washington D.C.,USA:IEEE Press,2017:602-607. [19] ZHANG Rui,SUN Jingchao,ZHANG Yanchao,et al.Secure spatial top-k query processing via untrusted location-based service providers[J].IEEE Transactions on Dependable and Secure Computing,2014,12(1):111-124. [20] LI Z,LEE K C K,ZHENG B,et al.IR-tree:an efficient index for geographic document search[J].IEEE Transactions on Knowledge and Data Engineering,2010,23(4):585-599. [21] CAO Xin,CONG Gao,GUO Tao,et al.Efficient processing of spatial group keyword queries[J].ACM Transactions on Database Systems,2015,40(2):1-48. |