Advertisement

Secure Data Management

Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings

  • Willem Jonker
  • Milan Petković
Conference proceedings SDM 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4165)

Table of contents

  1. Front Matter
  2. Privacy Protection

    1. Chao Yao, Lingyu Wang, Sean X. Wang, Sushil Jajodia
      Pages 1-17
    2. Stefan Böttcher, Sebastian Obermeier
      Pages 18-29
    3. Xiangdong An, Dawn Jutla, Nick Cercone
      Pages 30-47
    4. Ji-Won Byun, Yonglak Sohn, Elisa Bertino, Ninghui Li
      Pages 48-63
  3. Privacy Preserving Data Management

    1. Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee
      Pages 64-74
    2. Jin Wook Byun, Hyun Suk Rhee, Hyun-A Park, Dong Hoon Lee
      Pages 75-83
  4. Access Control

    1. Yunyu Song, Sylvia L. Osborn
      Pages 100-114
    2. Changwoo Byun, Seog Park
      Pages 115-130
    3. Amir H. Chinaei, Huaxin Zhang
      Pages 131-145
  5. Database Security

  6. Back Matter

About these proceedings

Introduction

Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidablepartof everydaylife. However, this development has greatly in?uenced people’s security concerns. As data is accessible anytime from anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information and endanger people’s privacy. Therefore, research in the area of secure data management is of growing imp- tance, attracting the attention of both the data management and security - search communities. The interesting problems range from traditional ones such asaccesscontrol(withallvariations,likerole-basedand/orcontext-aware),da- base security, operations on encrypted data, and privacy preserving data mining to cryptographic protocols. The call for papers attracted 33 papers both from universities and ind- try. The program committee selected 13 research papers for presentation at the workshop. These papers are also collected in this volume, which we hope will serve you as useful research and reference material.

Keywords

Extensible Markup Language (XML) Information access control algorithms authorization data encryption data security database metadata security privacy privacy perserving data mining secure data management secure storage security ubiquitous computing

Editors and affiliations

  • Willem Jonker
    • 1
  • Milan Petković
    • 2
  1. 1.Philips ResearchThe Netherlands
  2. 2.Philips Research, Information & System SecurityEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/11844662
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-38984-2
  • Online ISBN 978-3-540-38987-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site