Skip to main content
  • Conference proceedings
  • © 2008

Secure Data Management

5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5159)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): SDM: Workshop on Secure Data Management

Conference proceedings info: SDM 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (15 papers)

  1. Front Matter

  2. Invited Keynote Paper

    1. How Anonymous Is k-Anonymous? Look at Your Quasi-ID

      • Claudio Bettini, X. Sean Wang, Sushil Jajodia
      Pages 1-15
  3. Database Security

    1. Simulatable Binding: Beyond Simulatable Auditing

      • Lei Zhang, Sushil Jajodia, Alexander Brodsky
      Pages 16-31
    2. ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure

      • Mohamed R. Fouad, Guy Lebanon, Elisa Bertino
      Pages 32-49
    3. Responding to Anomalous Database Requests

      • Ashish Kamra, Elisa Bertino, Rimma Nehme
      Pages 50-66
    4. Auditing Inference Based Disclosures in Dynamic Databases

      • Vikram Goyal, S. K. Gupta, Manish Singh, Anand Gupta
      Pages 67-81
  4. Trust Management

    1. An Approach to Evaluate Data Trustworthiness Based on Data Provenance

      • Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu
      Pages 82-98
    2. Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations

      • Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke
      Pages 99-118
    3. A Trusted Approach to E-Commerce

      • Giannakis Antoniou, Lynn Batten, Udaya Parampalli
      Pages 119-132
  5. Security and Privacy in Healthcare

    1. On the Facilitation of Fine-Grained Access to Distributed Healthcare Data

      • Mark Slaymaker, David Power, Douglas Russell, Andrew Simpson
      Pages 169-184
    2. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare

      • Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 185-198
  6. Position Papers

    1. A Methodology for Bridging between RBAC and an Arbitrary Application Program

      • Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang
      Pages 199-208
    2. An Anonymity Model Achievable Via Microaggregation

      • Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas
      Pages 209-218
    3. Engineering Privacy Requirements in Business Intelligence Applications

      • Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis
      Pages 219-228
  7. Back Matter

Other Volumes

  1. Secure Data Management

About this book

Information and communication technologies are advancing fast. Processing speed is still increasing at a high rate, followed by advances in digital storage technology, which double storage capacity every year. Furthermore, communication techno- gies do not lag behind. The Internet has been widely used, as well as wireless te- nologies. With a few mouse clicks, people can communicate with each other around the world. All these advances have great potential to change the way people live, introducing new concepts like ubiquitous computing and ambient intelligence. Technology is becoming present everywhere in the form of smart and sensitive c- puting devices. They are nonintrusive, transparent and hidden in the background, but they collect, process, and share all kinds of information, including user beh- ior, in order to act in an intelligent and adaptive way. These emerging technologies put new requirements on security and data m- agement. As data are accessible anytime anywhere, it becomes much easier to get unauthorized data access. Furthermore, the use of new technologies has brought about some privacy concerns. It becomes simpler to collect, store, and search personal information, thereby endangering people’s privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The intere- ing problems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptographically enforced access control.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access