Advertisement

Secure Data Management

5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

  • Editors
  • Willem Jonker
  • Milan Petković
Conference proceedings SDM 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5159)

Table of contents

  1. Front Matter
  2. Invited Keynote Paper

    1. Claudio Bettini, X. Sean Wang, Sushil Jajodia
      Pages 1-15
  3. Database Security

    1. Lei Zhang, Sushil Jajodia, Alexander Brodsky
      Pages 16-31
    2. Mohamed R. Fouad, Guy Lebanon, Elisa Bertino
      Pages 32-49
    3. Ashish Kamra, Elisa Bertino, Rimma Nehme
      Pages 50-66
    4. Vikram Goyal, S. K. Gupta, Manish Singh, Anand Gupta
      Pages 67-81
  4. Trust Management

    1. Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu
      Pages 82-98
    2. Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke
      Pages 99-118
    3. Giannakis Antoniou, Lynn Batten, Udaya Parampalli
      Pages 119-132
  5. Privacy Protection

  6. Security and Privacy in Healthcare

    1. Mark Slaymaker, David Power, Douglas Russell, Andrew Simpson
      Pages 169-184
    2. Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker
      Pages 185-198
  7. Position Papers

    1. Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang
      Pages 199-208
    2. Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas
      Pages 209-218
    3. Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis
      Pages 219-228
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th VLDB Workshop on Secure Data Management, SDM 2008, held in Auckland, New Zealand, on August 24, 2008, in conjunction with VLDB 2008.

The 11 revised full papers presented together with a keynote paper were carefully reviewed and selected from 32 submissions for publication in the book. The papers are organized in topical sections on database security, trust management, privacy protection, and security and privacy in healthcare. The volume is rounded off by 3 position papers whose topics range from data disclosure control, via privacy protection to access control.

Keywords

Bridging access control algorithms anonymity authorization business intelligence compliance data encryption data security data sharing database security e-commerce identity-based encryption microdata protection security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-85259-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-85258-2
  • Online ISBN 978-3-540-85259-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site