Secure Data Management 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings / edited by Willem Jonker, Milan Petkovic.

The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains an important area of research especially due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based servic...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Jonker, Willem (Editor), Petkovic, Milan (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edition:1st ed. 2010.
Series:Information Systems and Applications, incl. Internet/Web, and HCI ; 6358
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3302601
003 MWH
005 20191022141105.0
007 cr nn 008mamaa
008 100908s2010 gw | s |||| 0|eng d
020 |a 9783642155468 
024 7 |a 10.1007/978-3-642-15546-8  |2 doi 
035 |a (DE-He213)978-3-642-15546-8 
050 4 |a E-Book 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
245 1 0 |a Secure Data Management  |h [electronic resource] :  |b 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010, Proceedings /  |c edited by Willem Jonker, Milan Petkovic. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a X, 172 p. 65 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 6358 
490 1 |a Springer eBook Collection 
505 0 |a Keynote Paper -- Assuring Data Trustworthiness - Concepts and Research Challenges -- Privacy Protection -- On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization -- eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss -- Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach -- Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining Privately on Outsourced Data -- Computationally Efficient Searchable Symmetric Encryption -- Towards the Secure Modelling of OLAP Users’ Behaviour -- A Formal P3P Semantics for Composite Services -- A Geometric Approach for Efficient Licenses Validation in DRM -- Differentially Private Data Release through Multidimensional Partitioning. 
520 |a The VLDB Secure Data Management Workshop was held for the 7th time this year. The topic of data security remains an important area of research especially due to the growing proliferation of data in open environments as a result of emerging data services such as cloud computing, location based services, and health-related services. Con?dentiality is the main driving force behind the - search that covers topics such as privacy enhancing technologies, access control, and search in encrypted data. We received 20 submissions from which the program committee selected 10 papers to be presented at the workshop and included in the proceedings (50% acceptancerate). In addition, we areproud that Elisa Bertino accepted our in- tation to give a keynote for which she selected the topic of data trustworthiness. We hope the papers collected in this volume will stimulate your research in this area. The regular papers in the proceeding have been grouped into two sections. The?rstsectionfocusesonprivacy.Thepapersinthissectionpresentabalanced mix of theoretical work on anonymity and application-oriented work. Thesecondsectionfocusesondatasecurityinopenenvironments.Thepapers address issues related to the management of con?dential data that is stored in or released to open environments, such as, for example, in cloud computing. We wish to thank all the authors of submitted papers for their high-quality submissions. We would also like to thank the program committee members as well as additional referees for doing an excellent review job. Finally, let us - knowledge the work of Luan Ibraimi, who helped in the technical preparation of the proceedings. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Computer communication systems. 
650 0 |a Application software. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers and civilization. 
690 |a Electronic resources (E-books) 
700 1 |a Jonker, Willem.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Petkovic, Milan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 6358 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-642-15546-8  |3 Click to view e-book  |t 0 
907 |a .b33026014  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i22157633  |z 02-26-20 
999 f f |i f38a9501-9d1b-5181-8661-d895a241272a  |s 29bd2791-d746-564c-bc84-a823823d2da9  |t 0 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |t 0  |e E-Book  |h Library of Congress classification  |i Elec File