| 000 | 03479nam a22005655i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-15546-8 | ||
| 003 | DE-He213 | ||
| 005 | 20140220084546.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100908s2010 gw | s |||| 0|eng d | ||
| 020 |
_a9783642155468 _9978-3-642-15546-8 |
||
| 024 | 7 |
_a10.1007/978-3-642-15546-8 _2doi |
|
| 050 | 4 | _aQA76.9.A25 | |
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aJonker, Willem. _eeditor. |
|
| 245 | 1 | 0 |
_aSecure Data Management _h[electronic resource] : _b7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings / _cedited by Willem Jonker, Milan Petković. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
| 300 |
_aX, 172p. 65 illus. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6358 |
|
| 505 | 0 | _aKeynote Paper -- Assuring Data Trustworthiness - Concepts and Research Challenges -- Privacy Protection -- On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization -- eM2: An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss -- Constrained Anonymization of Production Data: A Constraint Satisfaction Problem Approach -- Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems -- Data Security in Open Environments -- Joining Privately on Outsourced Data -- Computationally Efficient Searchable Symmetric Encryption -- Towards the Secure Modelling of OLAP Users’ Behaviour -- A Formal P3P Semantics for Composite Services -- A Geometric Approach for Efficient Licenses Validation in DRM -- Differentially Private Data Release through Multidimensional Partitioning. | |
| 520 | _aThis book constitutes the proceedings of the 7th VLDB Workshop on Secure Data Management held in Singapore in September 17, 2010. The regular papers in the proceedings are grouped into two sections. The first section focuses on privacy. The papers in this section present a balanced mix of theoretical work on anonymity and application-oriented work. The second focuses on data security in open environments. The papers address issues related to the management of confidential data that is stored in or released to open environments, such as, for example, in cloud computing. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation storage and retrieval systems. | |
| 650 | 0 | _aInformation systems. | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aInformation Storage and Retrieval. |
| 700 | 1 |
_aPetković, Milan. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642155451 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6358 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-15546-8 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c112663 _d112663 |
||