Secure Data Management [electronic resource] : Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings / edited by Willem Jonker, Milan Petković.

Contributor(s): Jonker, Willem [editor.] | Petković, Milan [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 3674Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Description: X, 246 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540319740Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Database management | Information storage and retrieval systems | Information Systems | Computer Science | Database Management | Information Storage and Retrieval | Computer Communication Networks | Data Encryption | Operating Systems | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.74 LOC classification: QA76.9.D3Online resources: Click here to access online
Contents:
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK3755

Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha