Abstract
We provide a formal model of security guarantees offered by digital signature schemes when they are applied to structured data. This model is an important step towards managing the integrity of data that is shared, integrated, transformed, and exchanged on the World Wide Web. We express signature semantics using well-known database constraints, which can help authors decide what to sign, help recipients evaluate the integrity of signed data, and clarify the capabilities of different signature technologies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley, Reading (1995)
Baxevanis, A.D.: Molecular biology database collection. Nucleic Acids Research (2003), available at http://www3.oup.co.uk/nar/database/
Bertino, E., Mella, G., Correndo, G., Ferrari, E.: An infrastructure for managing secure update operations on xml data. In: Symposium on Access control models and technologies, pp. 110–122. ACM Press, New York (2003)
Bull, L., Stanski, P., Squire, D.M.: Content extraction signatures using xml digital signatures and custom transforms on-demand. In: Conference on World Wide Web, pp. 170–177. ACM Press, New York (2003)
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18–36 (1990)
Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, S.G.: Flexible authentication of xml documents. In: Proceedings of the 8th ACM conference on Computer and Communications Security, pp. 136–145. ACM Press, New York (2001)
Devanbu, P.T., Gertz, M., Martel, C., Stubblebine, S.G.: Authentic third-party data publication. In: IFIP Workshop on Database Security, pp. 101–112 (2000)
Halevy, A.: Answering queries using views: A survey. VLDB Journal 10(4), 270–294 (2001)
Johnson, R., Molnar, D., Song, D.X., Wagner, D.: Homomorphic signature schemes. In: RSA Conference on Topics in Cryptology, pp. 244–262. Springer, Heidelberg (2002)
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, pp. 122–134 (1980)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Micali, S., Rivest, R.L.: Transitive signature schemes. In: RSA Conference on Topics in Cryptology, pp. 236–243. Springer, Heidelberg (2002)
Ostrovsky, R., Rackoff, C., Smith, A.: Efficient consistency proofs on a committed database (2003)
Buneman, P., Khanna, S., Tan, W.-C.: Data Provenance: Some Basic Issues. In: Foundations of Software Technology and Theoretical Computer Science 2000 (2000)
Popa, L., Tannen, V.: An equational chase for path-conjunctive queries, constraints, and views. In: Beeri, C., Bruneman, P. (eds.) ICDT 1999. LNCS, vol. 1540, pp. 39–57. Springer, Heidelberg (1998)
A question of balance: Private rights and the public interest in scientific and technical databases. National Academy Press, National Research Council (1999)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Rivest, R.: Two new signature schemes. Presented at Cambridge seminar (March 2001), See http://www.cl.cam.ac.uk/Research/Security/seminars/2000/rivest-tss.pdf
RSA Data Security, Inc. PKCS #1 v2.1: RSA Public Key Cryptography Standard (June 2002)
Secure hash standard. Federal Information Processing Standards Publication (FIPS PUB), 180(1) (April 1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Miklau, G., Suciu, D. (2004). Modeling Integrity in Data Exchange. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2004. Lecture Notes in Computer Science, vol 3178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30073-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-30073-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22983-4
Online ISBN: 978-3-540-30073-1
eBook Packages: Springer Book Archive