Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings by Willem JonkerSecure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings by Willem Jonker

Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2…

byWillem JonkerEditorMilan Petkovic

Paperback | August 25, 2005

Pricing and Purchase Info

$114.32 online 
$136.95 list price save 16%
Earn 572 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM 2005, held in Trondheim, Norway in August/September 2005 in conjunction with VLDB 2005.The 16 revised full papers presented were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on encrypted data access, access control, information disclosure control in databases, privacy and security support for distributed applications, and with a special focus on security and privacy in healthcare.
Title:Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2…Format:PaperbackDimensions:246 pages, 23.5 × 15.5 × 0.01 inPublished:August 25, 2005Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540287981

ISBN - 13:9783540287988

Look for similar items by category:

Reviews

Table of Contents

Encrypted Data Access.- Efficient Key Updates in Encrypted Database Systems.- Metadata Management in Outsourced Encrypted Databases.- Experiments with Queries over Encrypted Data Using Secret Sharing.- Access Control.- An Authorization Framework for Sharing Data in Web Service Federations.- User-Managed Access Control for Health Care Systems.- Specifying an Access Control Model for Ontologies for the Semantic Web.- A Formal Access Control Model for XML Databases.- Information Disclosure Control in Databases.- Can Attackers Learn from Samples?.- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution.- Detecting Privacy Violations in Sensitive XML Databases.- Suppressing Microdata to Prevent Probabilistic Classification Based Inference.- On Deducibility and Anonymisation in Medical Databases.- Privacy and Security Support for Distributed Applications.- Protecting Privacy Against Location-Based Personal Identification.- Information SeeSaw: Availability vs. Security Management in the UbiComp World.- XML Security in the Next Generation Optical Disc Context.- Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes.