Secure Data Management

5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

  • Editors
  • Willem Jonker
  • Milan Petković
Conference proceedings SDM 2008

DOI: 10.1007/978-3-540-85259-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5159)

Table of contents (15 papers)

  1. Front Matter
  2. Invited Keynote Paper

    1. How Anonymous Is k-Anonymous? Look at Your Quasi-ID
      Claudio Bettini, X. Sean Wang, Sushil Jajodia
      Pages 1-15
  3. Database Security

    1. Simulatable Binding: Beyond Simulatable Auditing
      Lei Zhang, Sushil Jajodia, Alexander Brodsky
      Pages 16-31
    2. ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure
      Mohamed R. Fouad, Guy Lebanon, Elisa Bertino
      Pages 32-49
    3. Responding to Anomalous Database Requests
      Ashish Kamra, Elisa Bertino, Rimma Nehme
      Pages 50-66
    4. Auditing Inference Based Disclosures in Dynamic Databases
      Vikram Goyal, S. K. Gupta, Manish Singh, Anand Gupta
      Pages 67-81
  4. Trust Management

    1. An Approach to Evaluate Data Trustworthiness Based on Data Provenance
      Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu
      Pages 82-98
    2. Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations
      Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke
      Pages 99-118
    3. A Trusted Approach to E-Commerce
      Giannakis Antoniou, Lynn Batten, Udaya Parampalli
      Pages 119-132
  5. Privacy Protection

  6. Security and Privacy in Healthcare

    1. On the Facilitation of Fine-Grained Access to Distributed Healthcare Data
      Mark Slaymaker, David Power, Douglas Russell, Andrew Simpson
      Pages 169-184
    2. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare
      Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 185-198
  7. Position Papers

    1. A Methodology for Bridging between RBAC and an Arbitrary Application Program
      Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang
      Pages 199-208
    2. An Anonymity Model Achievable Via Microaggregation
      Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas
      Pages 209-218
    3. Engineering Privacy Requirements in Business Intelligence Applications
      Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis
      Pages 219-228
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th VLDB Workshop on Secure Data Management, SDM 2008, held in Auckland, New Zealand, on August 24, 2008, in conjunction with VLDB 2008.

The 11 revised full papers presented together with a keynote paper were carefully reviewed and selected from 32 submissions for publication in the book. The papers are organized in topical sections on database security, trust management, privacy protection, and security and privacy in healthcare. The volume is rounded off by 3 position papers whose topics range from data disclosure control, via privacy protection to access control.

Keywords

Bridging access control algorithms anonymity authorization business intelligence compliance data encryption data security data sharing database security e-commerce identity-based encryption microdata protection security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85258-2
  • Online ISBN 978-3-540-85259-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349