Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.

The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.

Author(s): Hakan Hacıgümüş, Sharad Mehrotra (auth.), Willem Jonker, Milan Petković (eds.)
Series: Lecture Notes in Computer Science 3674 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 246
Tags: Database Management; Information Storage and Retrieval; Computer Communication Networks; Data Encryption; Operating Systems; Management of Computing and Information Systems

Front Matter....Pages -
Efficient Key Updates in Encrypted Database Systems....Pages 1-15
Metadata Management in Outsourced Encrypted Databases....Pages 16-32
Experiments with Queries over Encrypted Data Using Secret Sharing....Pages 33-46
An Authorization Framework for Sharing Data in Web Service Federations....Pages 47-62
User-Managed Access Control for Health Care Systems....Pages 63-72
Specifying an Access Control Model for Ontologies for the Semantic Web....Pages 73-85
A Formal Access Control Model for XML Databases....Pages 86-103
Can Attackers Learn from Samples?....Pages 104-123
Dynamic Disclosure Monitor ( D 2 Mon ): An Improved Query Processing Solution....Pages 124-142
Detecting Privacy Violations in Sensitive XML Databases....Pages 143-154
Suppressing Microdata to Prevent Probabilistic Classification Based Inference....Pages 155-169
On Deducibility and Anonymisation in Medical Databases....Pages 170-184
Protecting Privacy Against Location-Based Personal Identification....Pages 185-199
Information SeeSaw: Availability vs. Security Management in the UbiComp World....Pages 200-216
XML Security in the Next Generation Optical Disc Context....Pages 217-233
Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes....Pages 234-240
Back Matter....Pages -