Normal view MARC view ISBD view

Secure Data Management [electronic resource] : Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings / edited by Willem Jonker, Milan Petkovic.

Contributor(s): Jonker, Willem [editor.] | Petkovic, Milan [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Information Systems and Applications, incl. Internet/Web, and HCI: 3674Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005Edition: 1st ed. 2005.Description: X, 246 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540319740.Subject(s): Cryptography | Data encryption (Computer science) | Computer networks  | Database management | Information storage and retrieval systems | Operating systems (Computers) | Electronic data processing -- Management | Cryptology | Computer Communication Networks | Database Management | Information Storage and Retrieval | Operating Systems | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes.

There are no comments for this item.

Log in to your account to post a comment.