Secure Data Management [electronic resource] : Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings / edited by Willem Jonker, Milan Petković.
Material type: TextSeries: Lecture Notes in Computer Science ; 3674Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005Description: X, 246 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540319740Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Database management | Information storage and retrieval systems | Information Systems | Computer Science | Database Management | Information Storage and Retrieval | Computer Communication Networks | Data Encryption | Operating Systems | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.74 LOC classification: QA76.9.D3Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK3755 |
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontologies for the Semantic Web -- A Formal Access Control Model for XML Databases -- Information Disclosure Control in Databases -- Can Attackers Learn from Samples? -- Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution -- Detecting Privacy Violations in Sensitive XML Databases -- Suppressing Microdata to Prevent Probabilistic Classification Based Inference -- On Deducibility and Anonymisation in Medical Databases -- Privacy and Security Support for Distributed Applications -- Protecting Privacy Against Location-Based Personal Identification -- Information SeeSaw: Availability vs. Security Management in the UbiComp World -- XML Security in the Next Generation Optical Disc Context -- Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.
There are no comments on this title.