LEADER 04805nam 22008175 450 001 996465282003316 005 20200702225731.0 010 $a3-642-04219-8 024 7 $a10.1007/978-3-642-04219-5 035 $a(CKB)1000000000772894 035 $a(SSID)ssj0000319939 035 $a(PQKBManifestationID)11255873 035 $a(PQKBTitleCode)TC0000319939 035 $a(PQKBWorkID)10342765 035 $a(PQKB)11488138 035 $a(DE-He213)978-3-642-04219-5 035 $a(MiAaPQ)EBC3064538 035 $a(PPN)139955488 035 $a(EXLCZ)991000000000772894 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSecure Data Management$b[electronic resource] $e6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009, Proceedings /$fedited by Willem Jonker, Milan Petkovic 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (IX, 173 p.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v5776 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-04218-X 320 $aIncludes bibliographical references and index. 327 $aDatabase Security -- Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning -- Do You Know Where Your Data?s Been? ? Tamper-Evident Database Provenance -- Database Intrusion Detection Using Role Profiling with Role Hierarchy -- Query Processing Techniques for Compliance with Data Confidence Policies -- Access Control -- An Access Control Language for a General Provenance Model -- A Flexible Access Control Model for Distributed Collaborative Editors -- On the Construction and Verification of Self-modifying Access Control Policies -- Controlling Access to XML Documents over XML Native and Relational Databases -- Privacy Protection -- Longitude: Centralized Privacy-Preserving Computation of Users? Proximity -- L-Cover: Preserving Diversity by Anonymity. 330 $aThis book constitutes the refereed proceedings of the 6th VLDB Workshop on Secure Data Management, SDM 2009, held in Lyon, France, on August 28, 2009, in conjunction with VLDB 2009. The 10 revised full papers presented were carefully reviewed and selected from 24 submissions for publication in the book. The topics in this volume range from traditional ones, such as access control and general database security, via provacy protection to new research directions, such as cryptographically enforded access control. The papers are organized in topical sections on database security, access control, and privacy protection. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v5776 606 $aDatabase management 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aInformation storage and retrieval 606 $aComputer organization 606 $aComputers and civilization 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 608 $aKongress.$2swd 608 $aLyon (2009)$2swd 615 0$aDatabase management. 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aInformation storage and retrieval. 615 0$aComputer organization. 615 0$aComputers and civilization. 615 14$aDatabase Management. 615 24$aCryptology. 615 24$aComputer Communication Networks. 615 24$aInformation Storage and Retrieval. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aComputers and Society. 676 $a005.74 686 $aSS 4800$2rvk 702 $aJonker$b Willem$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPetkovic$b Milan$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSDM 2009 906 $aBOOK 912 $a996465282003316 996 $aSecure Data Management$9772044 997 $aUNISA