𝔖 Scriptorium
✦   LIBER   ✦

📁

Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings

✍ Scribed by Hakan Hacıgümüş, Sharad Mehrotra (auth.), Willem Jonker, Milan Petković (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2005
Tongue
English
Leaves
249
Series
Lecture Notes in Computer Science 3674 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.

The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.

✦ Table of Contents


Front Matter....Pages -
Efficient Key Updates in Encrypted Database Systems....Pages 1-15
Metadata Management in Outsourced Encrypted Databases....Pages 16-32
Experiments with Queries over Encrypted Data Using Secret Sharing....Pages 33-46
An Authorization Framework for Sharing Data in Web Service Federations....Pages 47-62
User-Managed Access Control for Health Care Systems....Pages 63-72
Specifying an Access Control Model for Ontologies for the Semantic Web....Pages 73-85
A Formal Access Control Model for XML Databases....Pages 86-103
Can Attackers Learn from Samples?....Pages 104-123
Dynamic Disclosure Monitor ( D 2 Mon ): An Improved Query Processing Solution....Pages 124-142
Detecting Privacy Violations in Sensitive XML Databases....Pages 143-154
Suppressing Microdata to Prevent Probabilistic Classification Based Inference....Pages 155-169
On Deducibility and Anonymisation in Medical Databases....Pages 170-184
Protecting Privacy Against Location-Based Personal Identification....Pages 185-199
Information SeeSaw: Availability vs. Security Management in the UbiComp World....Pages 200-216
XML Security in the Next Generation Optical Disc Context....Pages 217-233
Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes....Pages 234-240
Back Matter....Pages -

✦ Subjects


Database Management; Information Storage and Retrieval; Computer Communication Networks; Data Encryption; Operating Systems; Management of Computing and Information Systems


📜 SIMILAR VOLUMES


Secure Data Management: Second VLDB Work
✍ Hakan Hacıgümüş, Sharad Mehrotra (auth.), Willem Jonker, Milan Petković (eds.) 📂 Library 📅 2005 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<P>This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.</P><P>The 16 revised full papers presented were carefully reviewed and selected from

Data Management in Grids: First VLDB Wor
✍ Reagan W. Moore (auth.), Jean-Marc Pierson (eds.) 📂 Library 📅 2006 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in Grids, DMG 2005, held in Trondheim, Norway in September 2005 in conjunction with VLDB 2005.</P><P>The 9 revised full papers presented together with 2 invited papers were car

Data Management in Grids: First VLDB Wor
✍ Reagan W. Moore (auth.), Jean-Marc Pierson (eds.) 📂 Library 📅 2006 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in Grids, DMG 2005, held in Trondheim, Norway in September 2005 in conjunction with VLDB 2005.</P><P>The 9 revised full papers presented together with 2 invited papers were car

Secure Data Management: Third VLDB Works
✍ Chao Yao, Lingyu Wang, Sean X. Wang, Sushil Jajodia (auth.), Willem Jonker, Mila 📂 Library 📅 2006 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidablepartof everydaylife. How

Secure Data Management: 4th VLDB Worksho
✍ Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa (auth.), Willem Jonker, Milan 📂 Library 📅 2007 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and securit