Amazon cover image
Image from Amazon.com
Image from Google Jackets

Secure Data Management [electronic resource] : Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings / edited by Willem Jonker, Milan Petković.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 3674Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Description: X, 246 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540319740
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.74 23
LOC classification:
  • QA76.9.D3
Online resources:
Contents:
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK3755

Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India