Coverart for item
The Resource Secure data management : 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings, Willem Jonker, Milan Petkovic (eds.)

Secure data management : 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings, Willem Jonker, Milan Petkovic (eds.)

Label
Secure data management : 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings
Title
Secure data management
Title remainder
6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings
Statement of responsibility
Willem Jonker, Milan Petkovic (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the 6th VLDB Workshop on Secure Data Management, SDM 2009, held in Lyon, France, on August 28, 2009, in conjunction with VLDB 2009. The 10 revised full papers presented were carefully reviewed and selected from 24 submissions for publication in the book. The topics in this volume range from traditional ones, such as access control and general database security, via provacy protection to new research directions, such as cryptographically enforded access control. The papers are organized in topical sections on database security, access control, and privacy protection
Member of
Cataloging source
GW5XE
Dewey number
005.74068
Illustrations
illustrations
Index
index present
LC call number
QA76.9.D314
LC item number
S46 2009
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2009
http://bibfra.me/vocab/lite/meetingName
SDM (Workshop)
Nature of contents
  • dictionaries
  • bibliography
NLM call number
QA 76.9.D314
http://library.link/vocab/relatedWorkOrContributorDate
  • 1962-
  • 2009
http://library.link/vocab/relatedWorkOrContributorName
  • Jonker, Willem
  • Petković, Milan
  • SDM (Workshop)
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary: SL 3-information systems and application, incl. Internet/Web and HCI
Series volume
5776
http://library.link/vocab/subjectName
  • Database management
  • Computer security
  • Computer Security
  • Database Management Systems
  • Data encryption (Computer science)
  • Data protection
  • Database management
  • Database security
  • Computers
  • Informatique
  • Computer security
  • Database management
  • Authentifikation
  • Datenbanksystem
  • Datensicherung
  • Datenverwaltung
  • Privatsphäre
  • Trusted Computing
  • Zugriffskontrolle
Label
Secure data management : 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings, Willem Jonker, Milan Petkovic (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Database Security -- Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning -- Do You Know Where Your Data's Been? -- Tamper-Evident Database Provenance -- Database Intrusion Detection Using Role Profiling with Role Hierarchy -- Query Processing Techniques for Compliance with Data Confidence Policies -- Access Control -- An Access Control Language for a General Provenance Model -- A Flexible Access Control Model for Distributed Collaborative Editors -- On the Construction and Verification of Self-modifying Access Control Policies -- Controlling Access to XML Documents over XML Native and Relational Databases -- Privacy Protection -- Longitude: Centralized Privacy-Preserving Computation of Users' Proximity -- L-Cover: Preserving Diversity by Anonymity
Control code
489218874
Dimensions
unknown
Extent
1 online resource (viii, 171 pages)
Form of item
online
Isbn
9783642042195
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-04218-8
Specific material designation
remote
System control number
(OCoLC)489218874
Label
Secure data management : 6th VLDB workshop, SDM 2009, Lyon, France, August 28, 2009 : proceedings, Willem Jonker, Milan Petkovic (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Database Security -- Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning -- Do You Know Where Your Data's Been? -- Tamper-Evident Database Provenance -- Database Intrusion Detection Using Role Profiling with Role Hierarchy -- Query Processing Techniques for Compliance with Data Confidence Policies -- Access Control -- An Access Control Language for a General Provenance Model -- A Flexible Access Control Model for Distributed Collaborative Editors -- On the Construction and Verification of Self-modifying Access Control Policies -- Controlling Access to XML Documents over XML Native and Relational Databases -- Privacy Protection -- Longitude: Centralized Privacy-Preserving Computation of Users' Proximity -- L-Cover: Preserving Diversity by Anonymity
Control code
489218874
Dimensions
unknown
Extent
1 online resource (viii, 171 pages)
Form of item
online
Isbn
9783642042195
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-642-04218-8
Specific material designation
remote
System control number
(OCoLC)489218874

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...