Data Security and Security Data

27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers

  • Lachlan M. MacKinnon
Conference proceedings BNCOD 2010

DOI: 10.1007/978-3-642-25704-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6121)

Table of contents (19 papers)

  1. Front Matter
  2. Invited Papers

  3. Full Papers

    1. Access Control Using Active Rules
      Raman Adaikkalavan, Sharma Chakravarthy
      Pages 12-24
    2. Providing Group Anonymity Using Wavelet Transform
      Oleg Chertov, Dan Tavrov
      Pages 25-36
    3. Defining Spatio-Temporal Granularities for Raster Data
      Gabriele Pozzani, Esteban Zimányi
      Pages 96-107
  4. Short Papers

  5. TLAD Best Paper

    1. Uses of Peer Assessment in Database Teaching and Learning
      James Paterson, John N. Wilson, Petra Leimich
      Pages 135-146
  6. PhD Forum Best Papers

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 27th British National Conference on Databases, BNCOD 27, held in Dundee, UK, in June 2010. The 10 revised full papers and 6 short papers, presented together with 3 invited papers, 1 best paper of the associated event on Teaching, Learning and Assessment of Databases (TLAD), and 2 PhD forum best papers were carefully reviewed and selected from 42 submissions. Special focus of the conference has been "Data Security and Security Data" and so the papers cover a wide range of topics such as data security, privacy and trust, security data, data integration and interoperability, data management for ubiquitous and mobile computing, data mining and information extraction, data modelling and architectures, data provenance, dataspaces, data streaming, databases and the grid, distributed information systems, electronic commerce, enterprise systems, heterogeneous databases, industrial applications, infrastructures and systems, intermittently connected data, file access methods and index structures, managing legacy data, new applications and processes, parallel and distributed databases, peer-to-peer data management, performance modelling of ubiquitous data use, personal data management, query and manipulation languages, query processing and optimisation, scientific applications, semantic Web and ontologies, semi-structured data, metadata and xml, user interfaces and data visualisation, Web data management and deep Web, Web services, and workflow support systems.

Keywords

database-driven applications event constraints ^ information system engineering privacy-preserving data mining theoretical foundations of data mining

Editors and affiliations

  • Lachlan M. MacKinnon
    • 1
  1. 1.School of Computing and Mathematical Sciences, Old Royal Naval CollegeUniversity of GreenwichLondonUK

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25703-2
  • Online ISBN 978-3-642-25704-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349