<P>This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.</P><P>The 16 revised full papers presented were carefully reviewed and selected from
Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings
✍ Scribed by Hakan Hacıgümüş, Sharad Mehrotra (auth.), Willem Jonker, Milan Petković (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2005
- Tongue
- English
- Leaves
- 250
- Series
- Lecture Notes in Computer Science 3674 Information Systems and Applications, incl. Internet/Web, and HCI
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.
The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.
✦ Table of Contents
Front Matter....Pages -
Efficient Key Updates in Encrypted Database Systems....Pages 1-15
Metadata Management in Outsourced Encrypted Databases....Pages 16-32
Experiments with Queries over Encrypted Data Using Secret Sharing....Pages 33-46
An Authorization Framework for Sharing Data in Web Service Federations....Pages 47-62
User-Managed Access Control for Health Care Systems....Pages 63-72
Specifying an Access Control Model for Ontologies for the Semantic Web....Pages 73-85
A Formal Access Control Model for XML Databases....Pages 86-103
Can Attackers Learn from Samples?....Pages 104-123
Dynamic Disclosure Monitor ( D 2 Mon ): An Improved Query Processing Solution....Pages 124-142
Detecting Privacy Violations in Sensitive XML Databases....Pages 143-154
Suppressing Microdata to Prevent Probabilistic Classification Based Inference....Pages 155-169
On Deducibility and Anonymisation in Medical Databases....Pages 170-184
Protecting Privacy Against Location-Based Personal Identification....Pages 185-199
Information SeeSaw: Availability vs. Security Management in the UbiComp World....Pages 200-216
XML Security in the Next Generation Optical Disc Context....Pages 217-233
Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes....Pages 234-240
Back Matter....Pages -
✦ Subjects
Database Management; Information Storage and Retrieval; Computer Communication Networks; Data Encryption; Operating Systems; Management of Computing and Information Systems
📜 SIMILAR VOLUMES
<p><P>This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in Grids, DMG 2005, held in Trondheim, Norway in September 2005 in conjunction with VLDB 2005.</P><P>The 9 revised full papers presented together with 2 invited papers were car
<p><P>This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in Grids, DMG 2005, held in Trondheim, Norway in September 2005 in conjunction with VLDB 2005.</P><P>The 9 revised full papers presented together with 2 invited papers were car
<p>Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidablepartof everydaylife. How
<p>Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and securit