Web searching accounts for one of the most frequently performed computations over the Internet as well as one of the most important applications of outsourced computing, producing results that critically affect users ’ decision-making behaviors. As such, verifying the integrity of Internet-based searches over vast amounts of web contents is essential. In this paper, we provide the first solution to this general security problem. We introduce the concept of an authenticated web crawler and present the design and prototype implementation of this new concept. An authenticated web crawler is a trusted program that computes a special “signature ” S over a collection of web contents it visits. Subject to this signature, web searches can be verifi...
An integral component of modern computing is the ability to outsource data and computation to powerf...
Password-based authentication is widely used online, despite its numerous shortcomings, enabling att...
Web applications have become one of the most common ways of providing access to online information a...
The number of successful attacks on the Internet shows that it is very difficult to guarantee the se...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
While users deserve security and privacy when using web services, these properties are at odds with ...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
The web technology we are enjoying now is insecure, especially for accessing sensitive information. ...
Executing authenticated computation on outsourced data is currently an area of major interest in cry...
The number of web pages is increasing intomillions and trillions around the world. To make searching...
<p>Internet websites are a regular medium for exchanging sensitive information such as online bankin...
It could be argued that without search engines, the web would have never grown to the size that it h...
International audienceQuerying Web search engines is by far the most frequent activity performed by ...
Secure pursuit strategies over encoded cloud information enable an approved client to inquiry inform...
An integral component of modern computing is the ability to outsource data and computation to powerf...
Password-based authentication is widely used online, despite its numerous shortcomings, enabling att...
Web applications have become one of the most common ways of providing access to online information a...
The number of successful attacks on the Internet shows that it is very difficult to guarantee the se...
We address the problem of authenticating pattern matching queries over textual data that is outsourc...
Abstract. Query answers from on-line databases can easily be corrupted by hackers or malicious datab...
While users deserve security and privacy when using web services, these properties are at odds with ...
Nowadays it is easy to track web users among websites: cookies, web bugs or browser fingerprints are...
The web technology we are enjoying now is insecure, especially for accessing sensitive information. ...
Executing authenticated computation on outsourced data is currently an area of major interest in cry...
The number of web pages is increasing intomillions and trillions around the world. To make searching...
<p>Internet websites are a regular medium for exchanging sensitive information such as online bankin...
It could be argued that without search engines, the web would have never grown to the size that it h...
International audienceQuerying Web search engines is by far the most frequent activity performed by ...
Secure pursuit strategies over encoded cloud information enable an approved client to inquiry inform...
An integral component of modern computing is the ability to outsource data and computation to powerf...
Password-based authentication is widely used online, despite its numerous shortcomings, enabling att...
Web applications have become one of the most common ways of providing access to online information a...