Skip to main content
  • Conference proceedings
  • © 2009

Secure Data Management

6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5776)

Part of the book sub series: Information Systems and Applications, incl. Internet/Web, and HCI (LNISA)

Conference series link(s): SDM: Workshop on Secure Data Management

Conference proceedings info: SDM 2009.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (10 papers)

  1. Front Matter

  2. Database Security

    1. Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning

      • Mustafa Canim, Murat Kantarcioglu, Ali Inan
      Pages 1-16
    2. Do You Know Where Your Data’s Been? – Tamper-Evident Database Provenance

      • Jing Zhang, Adriane Chapman, Kristen LeFevre
      Pages 17-32
    3. Database Intrusion Detection Using Role Profiling with Role Hierarchy

      • Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin
      Pages 33-48
    4. Query Processing Techniques for Compliance with Data Confidence Policies

      • Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham
      Pages 49-67
  3. Access Control

    1. An Access Control Language for a General Provenance Model

      • Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi Sandhu, Weili Han
      Pages 68-88
    2. A Flexible Access Control Model for Distributed Collaborative Editors

      • Abdessamad Imine, Asma Cherif, Michaël Rusinowitch
      Pages 89-106
    3. On the Construction and Verification of Self-modifying Access Control Policies

      • David Power, Mark Slaymaker, Andrew Simpson
      Pages 107-121
    4. Controlling Access to XML Documents over XML Native and Relational Databases

      • Lazaros Koromilas, George Chinis, Irini Fundulaki, Sotiris Ioannidis
      Pages 122-141
  4. Privacy Protection

    1. Longitude: Centralized Privacy-Preserving Computation of Users’ Proximity

      • Sergio Mascetti, Claudio Bettini, Dario Freni
      Pages 142-157
    2. L-Cover: Preserving Diversity by Anonymity

      • Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky
      Pages 158-171
  5. Back Matter

Other Volumes

  1. Secure Data Management

About this book

The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere,itbecomesmucheasiertoget unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information thereby endangering people’s privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The interesting pr- lems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptogra- ically enforced access control and encrypted databases. This year, the call for papers attracted 24 papers both from universities and industry. For presentation at the workshop,the ProgramCommittee selected 10 full papers (41% acceptance rate). These papers are collected in this volume, which we hope will serve as a useful research and reference material. The papers in the proceeding are grouped into three sections. The ?rst s- tion focuses on database security which remains an important research area. The papers in this section address several interesting topics including query optimization in encrypted databases, database provenance, database intrusion detection, and con?dence policy compliant query evaluation. The second section changes the focal point to the topic of access control. The papers in this s- tion deal with provenance access control, access control model for collaborative editors, self-modifying access control policies, and enforcing access control on XML documents. The third section focuses on privacy protection addressing the privacy issues around location-based services and anonymity/diversity for the micro-data release problem.

Keywords

  • access control
  • anonymity
  • business intelligence
  • cloud computing
  • database
  • distributed computing
  • e-commerce
  • game theory
  • healthcare
  • privacy
  • relational database
  • semantic web
  • trust

Editors and Affiliations

  • Department of Computer Science, University of Twente, Enschede, The Netherlands

    Willem Jonker

  • Philips Research Laboratories, Koninklijke Philips Electronics N.V., Eindhoven, The Netherlands

    Milan Petković

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions