01865oem 2200457Ia 450 991069687380332120080723093641.0(CKB)5470000002382142(OCoLC)77703942(EXLCZ)99547000000238214220070112d2006 ca engb|||||||||||||||||||||durcnu--|m||||crdrdacontentcrdamediacrrdacarrierTopographic map of quadrangles 3560 and 3562, Sir-Band (402), Khawja-Jir (403), and Bala-Murghab (404) quadrangles, Afghanistan[electronic resource] /compiled by Bohannon, Robert G. ; Department of the Interior, U.S. Geological Survey ; prepared in cooperation with the Afghan Geological Survey ... [and others][Reston, Va.] :U.S. Dept. of the Interior, U.S. Geological Survey,2006.Open-file report ;2005-1098-BUSGS Afghanistan project product ;no. 045Relief shown by contours, shading, and spot heights.Title from HTML index page and its links (viewed on Jan. 11, 2007).Includes location map."AGS Open File Report (402/403/404) 2005-1098-B."Topographic map of quadrangles 3560 and 3562, Sir-Band AfghanistanMapsTopographic maps.lcgftMaps.lcgftBohannon Robert G1389793Geological Survey (U.S.)Afghanistan.Geological and Mineral Survey.GISGISGPOBOOK9910696873803321Topographic map of quadrangles 3560 and 3562, Sir-Band (402), Khawja-Jir (403), and Bala-Murghab (404) quadrangles, Afghanistan3521717UNINA05445nam 22008655 450 991048432780332120251226195918.03-540-75248-X10.1007/978-3-540-75248-6(CKB)1000000000490948(SSID)ssj0000319938(PQKBManifestationID)11937758(PQKBTitleCode)TC0000319938(PQKBWorkID)10354541(PQKB)10882040(DE-He213)978-3-540-75248-6(MiAaPQ)EBC3063237(MiAaPQ)EBC6284171(PPN)123165377(MiAaPQ)EBC336874(EXLCZ)99100000000049094820100301d2007 u| 0engurnn#008mamaatxtccrSecure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings /edited by Willem Jonker, Milan Petkovic1st ed. 2007.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2007.1 online resource (X, 216 p.)Information Systems and Applications, incl. Internet/Web, and HCI,2946-1642 ;4721Bibliographic Level Mode of Issuance: Monograph3-540-75247-1 Includes bibliographical references and index.Access Control -- A Unified Conflict Resolution Algorithm -- Multi-layer Audit of Access Rights -- Refinement for Administrative Policies -- Database Security -- Authenticating kNN Query Results in Data Publishing -- Query Rewriting Algorithm Evaluation for XML Security Views -- Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases -- Architecture for Data Collection in Database Intrusion Detection Systems -- Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data -- Privacy Protection -- Generating Microdata with P-Sensitive K-Anonymity Property -- Preventing Privacy-Invasive Software Using Collaborative Reputation Systems -- Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement -- Positon Papers -- Requirements of Secure Storage Systems for Healthcare Records -- An Intrusion Detection System for Detecting Phishing Attacks -- A Three-Dimensional Conceptual Framework for Database Privacy -- Novel RFID Authentication Schemes for Security Enhancement and System Efficiency.Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such as ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks, mobility and personalization, put new requirements on privacy and security with respect to data management. As data are accessible anytime anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information and endanger people’s privacy. Therefore, research in the area of secure data management is of growing importance, attracting the attention of both the data managementand securityresearchcommunities. The interesting problemsrange from traditional topics, such as access control and general database security, via privacy preserving data mining, to new research directions, such as search on encrypted data and privacy-enhancing technologies. This year, the call for papers attracted 29 papers both from universities and industry. For presentation at the workshop,the ProgramCommittee selected 11 full papers (37% acceptance rate) as well as 4 position papers. These papers are also collected in this volume, which we hope will serve you as a useful research and reference material.Information Systems and Applications, incl. Internet/Web, and HCI,2946-1642 ;4721Database managementInformation storage and retrieval systemsComputer networksCryptographyData encryption (Computer science)Operating systems (Computers)Electronic data processingManagementDatabase ManagementInformation Storage and RetrievalComputer Communication NetworksCryptologyOperating SystemsIT OperationsDatabase management.Information storage and retrieval systems.Computer networks.Cryptography.Data encryption (Computer science).Operating systems (Computers).Electronic data processingManagement.Database Management.Information Storage and Retrieval.Computer Communication Networks.Cryptology.Operating Systems.IT Operations.005.8Jonker Willemedthttp://id.loc.gov/vocabulary/relators/edtPetkovic Milanedthttp://id.loc.gov/vocabulary/relators/edtSDM 2007MiAaPQMiAaPQMiAaPQBOOK9910484327803321Secure Data Management772044UNINA