Secure Data Management: 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 6th VLDB Workshop on Secure Data Management, SDM 2009, held in Lyon, France, on August 28, 2009, in conjunction with VLDB 2009.

The 10 revised full papers presented were carefully reviewed and selected from 24 submissions for publication in the book. The topics in this volume range from traditional ones, such as access control and general database security, via provacy protection to new research directions, such as cryptographically enforded access control. The papers are organized in topical sections on database security, access control, and privacy protection.

Author(s): Mustafa Canim, Murat Kantarcioglu, Ali Inan (auth.), Willem Jonker, Milan Petković (eds.)
Series: Lecture Notes in Computer Science 5776 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2009

Language: English
Pages: 173
Tags: Database Management; Information Storage and Retrieval; Data Encryption; Computer Systems Organization and Communication Networks; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning....Pages 1-16
Do You Know Where Your Data’s Been? – Tamper-Evident Database Provenance....Pages 17-32
Database Intrusion Detection Using Role Profiling with Role Hierarchy....Pages 33-48
Query Processing Techniques for Compliance with Data Confidence Policies....Pages 49-67
An Access Control Language for a General Provenance Model....Pages 68-88
A Flexible Access Control Model for Distributed Collaborative Editors....Pages 89-106
On the Construction and Verification of Self-modifying Access Control Policies....Pages 107-121
Controlling Access to XML Documents over XML Native and Relational Databases....Pages 122-141
Longitude: Centralized Privacy-Preserving Computation of Users’ Proximity....Pages 142-157
L-Cover: Preserving Diversity by Anonymity....Pages 158-171
Back Matter....Pages -