000 03479nam a22005655i 4500
001 978-3-642-15546-8
003 DE-He213
005 20140220084546.0
007 cr nn 008mamaa
008 100908s2010 gw | s |||| 0|eng d
020 _a9783642155468
_9978-3-642-15546-8
024 7 _a10.1007/978-3-642-15546-8
_2doi
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
100 1 _aJonker, Willem.
_eeditor.
245 1 0 _aSecure Data Management
_h[electronic resource] :
_b7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings /
_cedited by Willem Jonker, Milan Petković.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _aX, 172p. 65 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6358
505 0 _aKeynote Paper -- Assuring Data Trustworthiness - Concepts and Research Challenges -- Privacy Protection -- On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization -- eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss -- Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach -- Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining Privately on Outsourced Data -- Computationally Efficient Searchable Symmetric Encryption -- Towards the Secure Modelling of OLAP Users’ Behaviour -- A Formal P3P Semantics for Composite Services -- A Geometric Approach for Efficient Licenses Validation in DRM -- Differentially Private Data Release through Multidimensional Partitioning.
520 _aThis book constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management held in Singapore in September 17, 2010. The regular papers in the proceedings are grouped into two sections. The first section focuses on privacy. The papers in this section present a balanced mix of theoretical work on anonymity and application-oriented work. The second focuses on data security in open environments. The papers address issues related to the management of confidential data that is stored in or released to open environments, such as, for example, in cloud computing.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aData encryption (Computer science).
650 0 _aInformation storage and retrieval systems.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aData Encryption.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aComputers and Society.
650 2 4 _aInformation Storage and Retrieval.
700 1 _aPetković, Milan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642155451
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6358
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-15546-8
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c112663
_d112663