skip to content
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings Preview this item
ClosePreview this item
Checking...

Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings

Publisher: Berlin : Springer, 2008.
Series: Lecture notes in computer science, 5159.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Summary:

These emerging technologies put new requirements on security and data m- agement. Therefore, research in secure data management is gaining importance, attracting the attention of both the data  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Auckland (2008)
Kongress
Congresses
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
ISBN: 9783540852582 3540852581
OCLC Number: 244057381
Description: x, 228 pages : illustrations ; 24 cm.
Contents: Invited Keynote Paper.- How Anonymous Is k-Anonymous? Look at Your Quasi-ID.- Database Security.- Simulatable Binding: Beyond Simulatable Auditing.- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure.- Responding to Anomalous Database Requests.- Auditing Inference Based Disclosures in Dynamic Databases.- Trust Management.- An Approach to Evaluate Data Trustworthiness Based on Data Provenance.- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations.- A Trusted Approach to E-Commerce.- Privacy Protection.- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.- Query Rewriting for Access Control on Semantic Web.- Security and Privacy in Healthcare.- On the Facilitation of Fine-Grained Access to Distributed Healthcare Data.- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.- Position Papers.- A Methodology for Bridging between RBAC and an Arbitrary Application Program.- An Anonymity Model Achievable Via Microaggregation.- Engineering Privacy Requirements in Business Intelligence Applications.
Series Title: Lecture notes in computer science, 5159.
Responsibility: Willem Jonker, Milan Petkovic (eds.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/244057381> # Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "244057381" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/791979647#Place/berlin> ; # Berlin
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/database_security> ; # Database security
   schema:about <http://id.worldcat.org/fast/872779> ; # Computers--Access control
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/datenverwaltung> ; # Datenverwaltung
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/authentifikation> ; # Authentifikation
   schema:about <http://dewey.info/class/004/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/trusted_computing> ; # Trusted Computing
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/privatsphare> ; # Privatsphäre
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/datensicherung> ; # Datensicherung
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/datenbanksystem> ; # Datenbanksystem
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/computers_access_control> ; # Computers--Access control
   schema:about <http://id.worldcat.org/fast/888063> ; # Database security
   schema:about <http://experiment.worldcat.org/entity/work/data/791979647#Topic/zugriffskontrolle> ; # Zugriffskontrolle
   schema:bookFormat bgn:PrintBook ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/791979647#Meeting/sdm_2008_2008_auckland_n_z> ; # SDM 2008 (2008 : Auckland, N.Z.)
   schema:datePublished "2008" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/791979647> ;
   schema:genre "Kongress"@en ;
   schema:genre "Conference publication"@en ;
   schema:genre "Auckland (2008)"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
   schema:name "Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings"@en ;
   schema:productID "244057381" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/244057381#PublicationEvent/berlin_springer_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/791979647#Agent/springer> ; # Springer
   schema:url <http://dx.doi.org/10.1007/978-3-540-85259-9> ;
   schema:url <http://swbplus.bsz-bw.de/bsz285121243cov.htm> ;
   schema:url <http://digitool.hbz-nrw.de:1801/webclient/DeliveryManager?pid=3449820&custom%5Fatt%5F2=simple%5Fviewer> ;
   schema:workExample <http://worldcat.org/isbn/9783540852582> ;
   umbel:isLike <http://d-nb.info/98957184X> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/244057381> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/791979647#Place/auckland_n_z> # Auckland, N.Z.)
    a schema:Place ;
   schema:name "Auckland, N.Z.)" ;
    .

<http://id.worldcat.org/fast/872779> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control"@en ;
    .

<http://id.worldcat.org/fast/888063> # Database security
    a schema:Intangible ;
   schema:name "Database security"@en ;
    .

<http://worldcat.org/isbn/9783540852582>
    a schema:ProductModel ;
   schema:isbn "3540852581" ;
   schema:isbn "9783540852582" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/244057381> ; # Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science ;" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/244057381>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/244057381> ; # Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 ; proceedings
   schema:dateModified "2017-12-23" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.