Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings / Edition 1
by Willem Jonker
This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.
The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on
… See more details belowOverview
This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.
The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.
Product Details
- ISBN-13:
- 9783540229834
- Publisher:
- Springer Berlin Heidelberg
- Publication date:
- 10/05/2004
- Series:
- Lecture Notes in Computer Science Series, #3178
- Edition description:
- 2004
- Pages:
- 224
- Product dimensions:
- 9.21(w) x 6.14(h) x 0.49(d)
Table of Contents
Encrypted Data Access.- Secure and Privacy Preserving Outsourcing of Tree Structured Data.- Using Secret Sharing for Searching in Encrypted Data.- A Structure Preserving Database Encryption Scheme.- Modeling Integrity in Data Exchange.- Privacy Preserving Data Management.- Experimental Analysis of Privacy-Preserving Statistics Computation.- Achieving Privacy Preservation when Sharing Data for Clustering.- Privacy-Preserving Digital Rights Management.- Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns.- Access Control.- PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web.- A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.- Abstracting and Refining Authorization in SQL.- A Classifier-Based Approach to User-Role Assignment for Web Applications.- LTAM: A Location-Temporal Authorization Model.- Database Security.- Identifying Sensitive Associations in Databases for Release Control.- Using Delay to Defend Against Database Extraction.
Customer Reviews
Average Review: