Skip to main content
  • Conference proceedings
  • © 2005

Secure Data Management

Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3674)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): SDM: Workshop on Secure Data Management

Conference proceedings info: SDM 2005.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (16 papers)

  1. Front Matter

  2. Encrypted Data Access

    1. Efficient Key Updates in Encrypted Database Systems

      • Hakan Hacıgümüş, Sharad Mehrotra
      Pages 1-15
    2. Metadata Management in Outsourced Encrypted Databases

      • E. Damiani, S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, P. Samarati
      Pages 16-32
    3. Experiments with Queries over Encrypted Data Using Secret Sharing

      • Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker
      Pages 33-46
  3. Access Control

    1. User-Managed Access Control for Health Care Systems

      • Amir H. Chinaei, Frank Wm. Tompa
      Pages 63-72
    2. Specifying an Access Control Model for Ontologies for the Semantic Web

      • Cecilia M. Ionita, Sylvia L. Osborn
      Pages 73-85
  4. Information Disclosure Control in Databases

    1. Can Attackers Learn from Samples?

      • Ganesh Ramesh
      Pages 104-123
    2. Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution

      • Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman
      Pages 124-142
    3. Detecting Privacy Violations in Sensitive XML Databases

      • Stefan Böttcher, Rita Steinmetz
      Pages 143-154
    4. Suppressing Microdata to Prevent Probabilistic Classification Based Inference

      • Ayça Azgın HintoÄŸlu, Yücel Saygın
      Pages 155-169
    5. On Deducibility and Anonymisation in Medical Databases

      • David Power, Mark Slaymaker, Andrew Simpson
      Pages 170-184
  5. Privacy and Security Support for Distributed Applications

    1. Protecting Privacy Against Location-Based Personal Identification

      • Claudio Bettini, X. Sean Wang, Sushil Jajodia
      Pages 185-199
    2. Information SeeSaw: Availability vs. Security Management in the UbiComp World

      • Boris Dragovic, Calicrates Policroniades
      Pages 200-216
    3. XML Security in the Next Generation Optical Disc Context

      • Gopakumar G. Nair, Ajeesh Gopalakrishnan, Sjouke Mauw, Erik Moll
      Pages 217-233
  6. Back Matter

Other Volumes

  1. Secure Data Management

Keywords

  • XML security
  • authorization
  • data encryption
  • data security
  • digital rights managment
  • information
  • information hiding
  • metadata security
  • privacy
  • privacy perserving data mining
  • secure data management
  • secure storage
  • security
  • ubiquitous computing

Editors and Affiliations

  • Philips Research, The Netherlands

    Willem Jonker

  • Information & System Security, Philips Research, Eindhoven, The Netherlands

    Milan Petković

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions