Secure Data Management 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012, Proceedings / [electronic resource] : edited by Willem Jonker, Milan Petković. - 1st ed. 2012. - X, 177 p. 50 illus. online resource. - Information Systems and Applications, incl. Internet/Web, and HCI, 7482 2946-1642 ; . - Information Systems and Applications, incl. Internet/Web, and HCI, 7482 .

Tradeoff Analysis of Relational Database Storage of Privacy Preferences.-Differential Privacy in Practice.-  A Model for Quantifying Information Leakage -- Privacy Protocol for Linking Distributed Medical Data.-  Cloud and the City: Facilitating Flexible Access Control over Data-Streams -- Policies for Composed Emergencies in Support of Disaster Management -- Indexing Encrypted Documents for Supporting Efficient Keyword Search.-  Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services -- Secure Metric-Based Index for Similarity Cloud -- Provenance for Web 2.0 Data -- Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies -- Towards Trustworthy Health Platform Cloud. Differential Privacy in Practice.-  A Model for Quantifying Information Leakage -- Privacy Protocol for Linking Distributed Medical Data.-  Cloud and the City: Facilitating Flexible Access Control over Data-Streams -- Policies for Composed Emergencies in Support of Disaster Management -- Indexing Encrypted Documents for Supporting Efficient Keyword Search.-  Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services -- Secure Metric-Based Index for Similarity Cloud -- Provenance for Web 2.0 Data -- Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies -- Towards Trustworthy Health Platform Cloud.

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012. The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.

9783642328732

10.1007/978-3-642-32873-2 doi


Data protection.
Database management.
Information storage and retrieval systems.
Application software.
Cryptography.
Data encryption (Computer science).
Computer networks .
Data and Information Security.
Database Management.
Information Storage and Retrieval.
Computer and Information Systems Applications.
Cryptology.
Computer Communication Networks.

QA76.9.A25

005.8