Skip to main content
  • Conference proceedings
  • © 2004

Secure Data Management

VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3178)

Conference series link(s): SDM: Workshop on Secure Data Management

Conference proceedings info: SDM 2004.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (15 papers)

  1. Front Matter

  2. Encrypted Data Access

    1. Using Secret Sharing for Searching in Encrypted Data

      • Richard Brinkman, Jeroen Doumen, Willem Jonker
      Pages 18-27
    2. A Structure Preserving Database Encryption Scheme

      • Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
      Pages 28-40
    3. Modeling Integrity in Data Exchange

      • Gerome Miklau, Dan Suciu
      Pages 41-54
  3. Privacy Preserving Data Management

    1. Experimental Analysis of Privacy-Preserving Statistics Computation

      • Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
      Pages 55-66
    2. Achieving Privacy Preservation when Sharing Data for Clustering

      • Stanley R. M. Oliveira, Osmar R. Zaïane
      Pages 67-82
    3. Privacy-Preserving Digital Rights Management

      • Claudine Conrado, Milan Petković, Willem Jonker
      Pages 83-99
  4. Access Control

    1. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web

      • Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett
      Pages 118-132
    2. A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms

      • Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
      Pages 133-147
    3. Abstracting and Refining Authorization in SQL

      • Arnon Rosenthal, Edward Sciore
      Pages 148-162
    4. A Classifier-Based Approach to User-Role Assignment for Web Applications

      • Shengli Sheng, Sylvia L. Osborn
      Pages 163-171
    5. LTAM: A Location-Temporal Authorization Model

      • Hai Yu, Ee-Peng Lim
      Pages 172-186
  5. Database Security

    1. Identifying Sensitive Associations in Databases for Release Control

      • Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
      Pages 187-201
    2. Using Delay to Defend Against Database Extraction

      • Magesh Jayapandian, Brian Noble, James Mickens, H. V. Jagadish
      Pages 202-218
  6. Back Matter

Other Volumes

  1. Secure Data Management

About this book

Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people’s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope,willserveasavaluableresearchandreferencebookinyourprofessional life.

Editors and Affiliations

  • Philips Research, The Netherlands

    Willem Jonker

  • Philips Research, Information & System Security, Eindhoven, The Netherlands

    Milan Petković

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access