default search action
SDM 2008: Auckland, New Zealand (in conjuction with VLDB 2008)
- Willem Jonker, Milan Petkovic:
Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2
Invited Keynote Paper
- Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. 1-15
Database Security
- Lei Zhang, Sushil Jajodia, Alexander Brodsky:
Simulatable Binding: Beyond Simulatable Auditing. 16-31 - Mohamed R. Fouad, Guy Lebanon, Elisa Bertino:
ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. 32-49 - Ashish Kamra, Elisa Bertino, Rimma V. Nehme:
Responding to Anomalous Database Requests. 50-66 - Vikram Goyal, Shyam K. Gupta, Manish Singh, Anand Gupta:
Auditing Inference Based Disclosures in Dynamic Databases. 67-81
Trust Management
- Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu:
An Approach to Evaluate Data Trustworthiness Based on Data Provenance. 82-98 - Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke:
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. 99-118 - Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya:
A Trusted Approach to E-Commerce. 119-132
Privacy Protection
- Gabriele Gianini, Ernesto Damiani:
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. 133-150 - Jian Li, William K. Cheung:
Query Rewriting for Access Control on Semantic Web. 151-168
Security and Privacy in Healthcare
- Mark Slaymaker, David J. Power, Douglas Russell, Andrew Simpson:
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. 169-184 - Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. 185-198
Position Papers
- Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang:
A Methodology for Bridging between RBAC and an Arbitrary Application Program. 199-208 - Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas:
An Anonymity Model Achievable Via Microaggregation. 209-218 - Annamaria Chiasera, Fabio Casati, Florian Daniel, Yannis Velegrakis:
Engineering Privacy Requirements in Business Intelligence Applications. 219-228
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.