Secure Data Management

10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings

Editors:

ISBN: 978-3-319-06810-7 (Print) 978-3-319-06811-4 (Online)

Table of contents (16 chapters)

  1. Front Matter

    Pages I-X

  2. Key Note

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-5

      To Cloud Or Not To? Musings on Clouds, Security and Big Data

  3. Vision Papers

    1. Front Matter

      Pages 7-7

    2. No Access

      Book Chapter

      Pages 9-13

      Data Security – Challenges and Research Opportunities

    3. No Access

      Book Chapter

      Pages 14-17

      Research Challenges to Secure the Future Internet

    4. No Access

      Book Chapter

      Pages 18-22

      Security and Privacy of Data in a Cloud

    5. No Access

      Book Chapter

      Pages 23-27

      The Future of Information Security Research: Cryptology and Beyond

    6. No Access

      Book Chapter

      Pages 28-32

      Where Security Research Should Go in the Next Decade

    7. No Access

      Book Chapter

      Pages 33-36

      “Technology Should Be Smarter Than This!”: A Vision for Overcoming the Great Authentication Fatigue

    8. No Access

      Book Chapter

      Pages 37-41

      Data Security and Privacy in 2025?

    9. No Access

      Book Chapter

      Pages 42-47

      Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing

    10. No Access

      Book Chapter

      Pages 48-53

      Internet of Things

    11. No Access

      Book Chapter

      Pages 54-58

      Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler

  4. Workshop Papers

    1. Front Matter

      Pages 59-59

    2. No Access

      Book Chapter

      Pages 61-75

      Secure Similar Document Detection with Simhash

    3. No Access

      Book Chapter

      Pages 76-94

      Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure

    4. No Access

      Book Chapter

      Pages 95-107

      Query Log Attack on Encrypted Databases

    5. No Access

      Book Chapter

      Pages 108-120

      A Multi-Party Protocol for Privacy-Preserving Range Queries

    6. No Access

      Book Chapter

      Pages 121-138

      Privacy Implications of Privacy Settings and Tagging in Facebook

  5. Back Matter

    Pages 139-139