Secure Data Management: 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains an important area of research especially due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based services, and health-related services. Con?dentiality is the main driving force behind the - search that covers topics such as privacy enhancing technologies, access control, and search in encrypted data. We received 20 submissions from which the program committee selected 10 papers to be presented at the workshop and included in the proceedings (50% acceptancerate). In addition, we areproud that Elisa Bertino accepted our in- tation to give a keynote for which she selected the topic of data trustworthiness. We hope the papers collected in this volume will stimulate your research in this area. The regular papers in the proceeding have been grouped into two sections. The?rstsectionfocusesonprivacy.Thepapersinthissectionpresentabalanced mix of theoretical work on anonymity and application-oriented work. Thesecondsectionfocusesondatasecurityinopenenvironments.Thepapers address issues related to the management of con?dential data that is stored in or released to open environments, such as, for example, in cloud computing. We wish to thank all the authors of submitted papers for their high-quality submissions. We would also like to thank the program committee members as well as additional referees for doing an excellent review job. Finally, let us - knowledge the work of Luan Ibraimi, who helped in the technical preparation of the proceedings.

Author(s): Elisa Bertino, Hyo-Sang Lim (auth.), Willem Jonker, Milan Petković (eds.)
Series: Lecture Notes in Computer Science 6358 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 172
Tags: Data Encryption; Computer Communication Networks; Information Systems Applications (incl.Internet); Management of Computing and Information Systems; Computers and Society; Information Storage and Retrieval

Front Matter....Pages -
Assuring Data Trustworthiness - Concepts and Research Challenges....Pages 1-12
On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization....Pages 13-25
eM 2 : An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss....Pages 26-40
Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach....Pages 41-53
Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems....Pages 54-69
Joining Privately on Outsourced Data....Pages 70-86
Computationally Efficient Searchable Symmetric Encryption....Pages 87-100
Towards the Secure Modelling of OLAP Users’ Behaviour....Pages 101-112
A Formal P3P Semantics for Composite Services....Pages 113-131
A Geometric Approach for Efficient Licenses Validation in DRM....Pages 132-149
Differentially Private Data Release through Multidimensional Partitioning....Pages 150-168
Back Matter....Pages -