000 | 05137nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-642-15546-8 | ||
003 | DE-He213 | ||
005 | 20240730165124.0 | ||
007 | cr nn 008mamaa | ||
008 | 100908s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642155468 _9978-3-642-15546-8 |
||
024 | 7 |
_a10.1007/978-3-642-15546-8 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aSecure Data Management _h[electronic resource] : _b7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings / _cedited by Willem Jonker, Milan Petkovic. |
250 | _a1st ed. 2010. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2010. |
|
300 |
_aX, 172 p. 65 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v6358 |
|
505 | 0 | _aKeynote Paper -- Assuring Data Trustworthiness - Concepts and Research Challenges -- Privacy Protection -- On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization -- eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss -- Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach -- Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining Privately on Outsourced Data -- Computationally Efficient Searchable Symmetric Encryption -- Towards the Secure Modelling of OLAP Users' Behaviour -- A Formal P3P Semantics for Composite Services -- A Geometric Approach for Efficient Licenses Validation in DRM -- Differentially Private Data Release through Multidimensional Partitioning. | |
520 | _aThe VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains an important area of research especially due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based services, and health-related services. Con?dentiality is the main driving force behind the - search that covers topics such as privacy enhancing technologies, access control, and search in encrypted data. We received 20 submissions from which the program committee selected 10 papers to be presented at the workshop and included in the proceedings (50% acceptancerate). In addition, we areproud that Elisa Bertino accepted our in- tation to give a keynote for which she selected the topic of data trustworthiness. We hope the papers collected in this volume will stimulate your research in this area. The regular papers in the proceeding have been grouped into two sections. The?rstsectionfocusesonprivacy.Thepapersinthissectionpresentabalanced mix of theoretical work on anonymity and application-oriented work. Thesecondsectionfocusesondatasecurityinopenenvironments.Thepapers address issues related to the management of con?dential data that is stored in or released to open environments, such as, for example, in cloud computing. We wish to thank all the authors of submitted papers for their high-quality submissions. We would also like to thank the program committee members as well as additional referees for doing an excellent review job. Finally, let us - knowledge the work of Luan Ibraimi, who helped in the technical preparation of the proceedings. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _987504 |
|
650 | 0 |
_aElectronic data processing _xManagement. _987507 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aComputer Communication Networks. _987509 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _987512 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aJonker, Willem. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987513 |
|
700 | 1 |
_aPetkovic, Milan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987515 |
|
710 | 2 |
_aSpringerLink (Online service) _987517 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642155451 |
776 | 0 | 8 |
_iPrinted edition: _z9783642155475 |
830 | 0 |
_aInformation Systems and Applications, incl. Internet/Web, and HCI, _x2946-1642 ; _v6358 _987518 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-15546-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86109 _d86109 |