Please use this identifier to cite or link to this item:
https://doi.org/10.1145/1989323.1989374
DC Field | Value | |
---|---|---|
dc.title | We challenge you to certify your updates | |
dc.contributor.author | Chen, S. | |
dc.contributor.author | Dong, X.L. | |
dc.contributor.author | Lakshmanan, L.V.S. | |
dc.contributor.author | Srivastava, D. | |
dc.date.accessioned | 2013-07-04T08:07:01Z | |
dc.date.available | 2013-07-04T08:07:01Z | |
dc.date.issued | 2011 | |
dc.identifier.citation | Chen, S.,Dong, X.L.,Lakshmanan, L.V.S.,Srivastava, D. (2011). We challenge you to certify your updates. Proceedings of the ACM SIGMOD International Conference on Management of Data : 481-492. ScholarBank@NUS Repository. <a href="https://doi.org/10.1145/1989323.1989374" target="_blank">https://doi.org/10.1145/1989323.1989374</a> | |
dc.identifier.isbn | 9781450306614 | |
dc.identifier.issn | 07308078 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/40554 | |
dc.description.abstract | Correctness of data residing in a database is vital. While integrity constraint enforcement can often ensure data consistency, it is inadequate to protect against updates that involve careless, unintentional errors, e.g., whether a specified update to an employee's record was for the intended employee. We propose a novel approach that is complementary to existing integrity enforcement techniques, to guard against such erroneous updates. Our approach is based on (a) updaters providing an update certificate with each database update, and (b) the database system verifying the correctness of the update certificate provided before performing the update. We formalize a certificate as a (challenge, response) pair, and characterize good certificates as those that are easy for updaters to provide and, when correct, give the system enough confidence that the update was indeed intended. We present algorithms that efficiently enumerate good challenges, without exhaustively exploring the search space of all challenges. We experimentally demonstrate that (i) databases have many good challenges, (ii) these challenges can be efficiently identified, (iii) certificates can be quickly verified for correctness, (iv) under natural models of an updater's knowledge of the database, update certificates catch a high percentage of the erroneous updates without imposing undue burden on the updaters performing correct updates, and (v) our techniques are robust across a wide range of challenge parameter settings. © 2011 ACM. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1989323.1989374 | |
dc.source | Scopus | |
dc.subject | certificate | |
dc.subject | data quality | |
dc.subject | update | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1145/1989323.1989374 | |
dc.description.sourcetitle | Proceedings of the ACM SIGMOD International Conference on Management of Data | |
dc.description.page | 481-492 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.