Efficient tamper-evident data structures for untrusted servers

Many real-world applications run on untrusted servers or are run on servers that are subject to strong insider attacks. Although we cannot prevent an untrusted server from modifying or deleting data, with tamper-evident data structures, we can discover when this has occurred. If an untrusted server...

Full description

Bibliographic Details
Other Authors: Wallach, Dan S.
Format: Others
Language:English
Published: 2011
Subjects:
Online Access:http://hdl.handle.net/1911/62164