Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings / Edition 1

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings / Edition 1

by Willem Jonker
     
 

This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.

The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on

See more details below

Overview

This book constitutes the refereed proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, SDM 2004, held in Toronto, Canada in August 2004 in association with VLDB 2004.

The 15 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers are organized in topical sections on encrypted data access, privacy perserving data management, access control, and database security.

Product Details

ISBN-13:
9783540229834
Publisher:
Springer Berlin Heidelberg
Publication date:
10/05/2004
Series:
Lecture Notes in Computer Science Series, #3178
Edition description:
2004
Pages:
224
Product dimensions:
9.21(w) x 6.14(h) x 0.49(d)

Table of Contents

Encrypted Data Access.- Secure and Privacy Preserving Outsourcing of Tree Structured Data.- Using Secret Sharing for Searching in Encrypted Data.- A Structure Preserving Database Encryption Scheme.- Modeling Integrity in Data Exchange.- Privacy Preserving Data Management.- Experimental Analysis of Privacy-Preserving Statistics Computation.- Achieving Privacy Preservation when Sharing Data for Clustering.- Privacy-Preserving Digital Rights Management.- Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns.- Access Control.- PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web.- A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms.- Abstracting and Refining Authorization in SQL.- A Classifier-Based Approach to User-Role Assignment for Web Applications.- LTAM: A Location-Temporal Authorization Model.- Database Security.- Identifying Sensitive Associations in Databases for Release Control.- Using Delay to Defend Against Database Extraction.

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >