Secure Data Management

VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004. Proceedings

  • Willem Jonker
  • Milan Petković
Conference proceedings SDM 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3178)

Table of contents

  1. Front Matter
  2. Encrypted Data Access

    1. Richard Brinkman, Jeroen Doumen, Willem Jonker
      Pages 18-27
    2. Yuval Elovici, Ronen Waisenberg, Erez Shmueli, Ehud Gudes
      Pages 28-40
    3. Gerome Miklau, Dan Suciu
      Pages 41-54
  3. Privacy Preserving Data Management

    1. Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang
      Pages 55-66
    2. Stanley R. M. Oliveira, Osmar R. Zaïane
      Pages 67-82
    3. Claudine Conrado, Milan Petković, Willem Jonker
      Pages 83-99
  4. Access Control

    1. Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett
      Pages 118-132
    2. Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
      Pages 133-147
    3. Arnon Rosenthal, Edward Sciore
      Pages 148-162
    4. Shengli Sheng, Sylvia L. Osborn
      Pages 163-171
    5. Hai Yu, Ee-Peng Lim
      Pages 172-186
  5. Database Security

    1. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
      Pages 187-201
    2. Magesh Jayapandian, Brian Noble, James Mickens, H. V. Jagadish
      Pages 202-218
  6. Back Matter

About these proceedings

Introduction

Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data access. Furthermore, it will become easier to collect, store, and search personal information and endanger people’s privacy. As a result security and privacy of data becomes more and more of an issue. Therefore, secure data management, which is also privacy-enhanced, turns out to be a challenging goal that will also seriously in?uence the acceptance of ub- uitous computing and ambient intelligence concepts by society. With the above in mind, we organized the SDM 2004 workshop to initiate and promote secure data management as one of the important interdisciplinary - search ?elds that brings together people from the security research community and the data management research community. The call for papers attracted 28 submissions both from universities and industry. The program committee selected 15 researchpapers for presentation at the workshop.The technical c- tributions presented at the SDM workshop are collected in this volume, which, wehope,willserveasavaluableresearchandreferencebookinyourprofessional life.

Keywords

Extensible Markup Language (XML) SQL data encryption data security digital rights management information hiding metadata security multimedia security privacy privacy perserving data mining secure data management secure storage security xml security

Editors and affiliations

  • Willem Jonker
    • 1
  • Milan Petković
    • 2
  1. 1.Philips ResearchThe Netherlands
  2. 2.Philips Research, Information & System SecurityEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/b99822
  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-22983-4
  • Online ISBN 978-3-540-30073-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Pharma
Chemical Manufacturing
Biotechnology
Electronics
Telecommunications
Consumer Packaged Goods
Energy, Utilities & Environment