Matches in Ruben’s data for { <https://rubensworks.github.io/article-ldtraversal-security-short/> ?p ?o }
Showing triples 1 to 65 of
65
with 100 triples per page.
- article-ldtraversal-security-short author me.
- article-ldtraversal-security-short author me.
- article-ldtraversal-security-short creator me.
- article-ldtraversal-security-short creator me.
- article-ldtraversal-security-short about Big_Data.
- article-ldtraversal-security-short about Research.
- article-ldtraversal-security-short about Decentralization.
- article-ldtraversal-security-short about personal_data.
- article-ldtraversal-security-short author me.
- article-ldtraversal-security-short author me.
- article-ldtraversal-security-short coparticipatesWith me.
- article-ldtraversal-security-short coparticipatesWith me.
- article-ldtraversal-security-short type PublicationVolume.
- article-ldtraversal-security-short type ScholarlyArticle.
- article-ldtraversal-security-short type Article.
- article-ldtraversal-security-short type Document.
- article-ldtraversal-security-short type Document.
- article-ldtraversal-security-short type Document.
- article-ldtraversal-security-short type Q386724.
- article-ldtraversal-security-short type CreativeWork.
- article-ldtraversal-security-short type Work.
- article-ldtraversal-security-short P50 me.
- article-ldtraversal-security-short P50 me.
- article-ldtraversal-security-short maker me.
- article-ldtraversal-security-short maker me.
- article-ldtraversal-security-short title "A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing".
- article-ldtraversal-security-short isPartOf proceedings_of_the_6th_workshop_on_storing_querying_and_benchmarking_knowledge_graphs.
- article-ldtraversal-security-short name "A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing".
- article-ldtraversal-security-short label "A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing".
- article-ldtraversal-security-short name "A Prospective Analysis of Security Vulnerabilities within Link Traversal-Based Query Processing".
- article-ldtraversal-security-short topic Big_Data.
- article-ldtraversal-security-short topic Research.
- article-ldtraversal-security-short topic Decentralization.
- article-ldtraversal-security-short topic personal_data.
- article-ldtraversal-security-short subject Big_Data.
- article-ldtraversal-security-short subject Research.
- article-ldtraversal-security-short subject Decentralization.
- article-ldtraversal-security-short subject personal_data.
- article-ldtraversal-security-short authorList b0_b1721.
- article-ldtraversal-security-short topic Big_Data.
- article-ldtraversal-security-short topic Research.
- article-ldtraversal-security-short topic Decentralization.
- article-ldtraversal-security-short topic personal_data.
- article-ldtraversal-security-short abstract "The societal and economic consequences surrounding Big Data-driven platforms have increased the call for decentralized solutions. However, retrieving and querying data in more decentralized environments requires fundamentally different approaches, whose properties are not yet well understood. Link-Traversal-based Query Processing (LTQP) is a technique for querying over decentralized data networks, in which a client-side query engine discovers data by traversing links between documents. Since decentralized environments are potentially unsafe due to their non-centrally controlled nature, there is a need for client-side LTQP query engines to be resistant against security threats aimed at the query engine’s host machine or the query initiator’s personal data. As such, we have performed an analysis of potential security vulnerabilities of LTQP. This article provides an overview of security threats in related domains, which are used as inspiration for the identification of 10 LTQP security threats. This list of security threats forms a basis for future work in which mitigations for each of these threats need to be developed and tested for their effectiveness. With this work, we start filling the unknowns for enabling query execution over decentralized environments. Aside from future work on security, wider research will be needed to uncover missing building blocks for enabling true data decentralization.".
- article-ldtraversal-security-short datePublished "2022".
- article-ldtraversal-security-short mainEntityOfPage taelman_quweda_2022.
- article-ldtraversal-security-short sameAs article-ldtraversal-security-short.
- article-ldtraversal-security-short isPrimaryTopicOf taelman_quweda_2022.
- article-ldtraversal-security-short page taelman_quweda_2022.
- article-ldtraversal-security-short number "3279".
- article-ldtraversal-security-short number "80".
- article-ldtraversal-security-short number "65".
- article-ldtraversal-security-short volume "3279".
- article-ldtraversal-security-short locator "3279".
- article-ldtraversal-security-short locator "80".
- article-ldtraversal-security-short locator "65".
- article-ldtraversal-security-short volume "3279".
- article-ldtraversal-security-short position "3279".
- article-ldtraversal-security-short volumeNumber "3279".
- article-ldtraversal-security-short endingPage "80".
- article-ldtraversal-security-short startingPage "65".
- article-ldtraversal-security-short pageEnd "80".
- article-ldtraversal-security-short pageStart "65".
- article-ldtraversal-security-short pageEnd "80".
- article-ldtraversal-security-short pageStart "65".