


default search action
SDM 2008: Auckland, New Zealand (in conjuction with VLDB 2008)
- Willem Jonker, Milan Petkovic:

Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings. Lecture Notes in Computer Science 5159, Springer 2008, ISBN 978-3-540-85258-2
Invited Keynote Paper
- Claudio Bettini

, Xiaoyang Sean Wang, Sushil Jajodia:
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. 1-15
Database Security
- Lei Zhang, Sushil Jajodia, Alexander Brodsky:

Simulatable Binding: Beyond Simulatable Auditing. 16-31 - Mohamed R. Fouad, Guy Lebanon, Elisa Bertino:

ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure. 32-49 - Ashish Kamra, Elisa Bertino, Rimma V. Nehme:

Responding to Anomalous Database Requests. 50-66 - Vikram Goyal, Shyam K. Gupta, Manish Singh, Anand Gupta

:
Auditing Inference Based Disclosures in Dynamic Databases. 67-81
Trust Management
- Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu:

An Approach to Evaluate Data Trustworthiness Based on Data Provenance. 82-98 - Philipp Kärger, Daniel Olmedilla, Wolf-Tilo Balke

:
Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations. 99-118 - Giannakis Antoniou, Lynn Margaret Batten, Parampalli Udaya

:
A Trusted Approach to E-Commerce. 119-132
Privacy Protection
- Gabriele Gianini

, Ernesto Damiani
:
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. 133-150 - Jian Li, William K. Cheung

:
Query Rewriting for Access Control on Semantic Web. 151-168
Security and Privacy in Healthcare
- Mark Slaymaker

, David J. Power, Douglas Russell, Andrew Simpson
:
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. 169-184 - Luan Ibraimi, Qiang Tang, Pieter H. Hartel

, Willem Jonker:
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. 185-198
Position Papers
- Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang:

A Methodology for Bridging between RBAC and an Arbitrary Application Program. 199-208 - Josep Domingo-Ferrer, Francesc Sebé, Agusti Solanas

:
An Anonymity Model Achievable Via Microaggregation. 209-218 - Annamaria Chiasera, Fabio Casati

, Florian Daniel
, Yannis Velegrakis
:
Engineering Privacy Requirements in Business Intelligence Applications. 219-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














