Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Secure Data Management

Best Price (Coupon Required):
Buy Secure Data Management for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642042188
Condition
New
Product Description

The new emergingtechnologiesput new requirementsonsecurityanddata m- agement.Asdataareaccessibleanytimeanywhere,itbecomesmucheasiertoget unauthorized data access. Furthermore, the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal information thereby endangering peoples privacy. Therefore, research in secure data management is gaining importance, attracting the attention of both the data management and the security research communities. The interesting pr- lems range from traditional topics, such as, access control and general database security, via privacy protection to new research directions, such as cryptogra- ically enforced access control and encrypted databases. This year, the call for papers attracted 24 papers both from universities and industry. For presentation at the workshop,the ProgramCommittee selected 10 full papers (41% acceptance rate). These papers are collected in this volume, which we hope will serve as a useful research and reference material. The papers in the proceeding are grouped into three sections. The ?rst s- tion focuses on database security which remains an important research area. The papers in this section address several interesting topics including query optimization in encrypted databases, database provenance, database intrusion detection, and con?dence policy compliant query evaluation. The second section changes the focal point to the topic of access control. The papers in this s- tion deal with provenance access control, access control model for collaborative editors, self-modifying access control policies, and enforcing access control on XML documents. The third section focuses on privacy protection addressing the privacy issues around location-based servicesand anonymity/diversity for the micro-data release problem.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Understanding the Mathematical Way of Thinking  The Registers of Semiotic Representations

Understanding the Mathematical Way of Thinking The Registers of Semiotic Representations

$119.00
Quality Work in Higher Education

Quality Work in Higher Education

$119.00
Qualittsmanagement in der Praxis

Qualittsmanagement in der Praxis

$59.99
Changes in Production Efficiency in China

Changes in Production Efficiency in China

$84.99
Jahrbuch der Schiffbautechnischen Gesellschaft

Jahrbuch der Schiffbautechnischen Gesellschaft

$59.99
Lean-Kompendium

Lean-Kompendium

$49.99
Wirtschaftsmathematik I

Wirtschaftsmathematik I

$37.99
Pro Android

Pro Android

$44.99
Das gute Leben

Das gute Leben

$64.99
The Winter Frost (School for Unusual Magic #2) (Hardcover)

The Winter Frost (School for Unusual Magic #2) (Hardcover)

$11.24
When Politicians Talk

When Politicians Talk

$139.99
Raising Capital or Improving Risk Management and Efficiency?

Raising Capital or Improving Risk Management and Efficiency?

$129.00
Imperialism and the Wider Atlantic

Imperialism and the Wider Atlantic

$109.99
Distributed Detection and Data Fusion

Distributed Detection and Data Fusion

$129.00
Nanoparticles in Lung Cancer Therapy - Recent Trends

Nanoparticles in Lung Cancer Therapy - Recent Trends

$39.99
When Compressive Sensing Meets Mobile Crowdsensing

When Compressive Sensing Meets Mobile Crowdsensing

$109.99
Admiral Lord Nelson

Admiral Lord Nelson

$59.99
Osteoimmunology

Osteoimmunology

$129.00
Hot-Carrier Reliability of MOS VLSI Circuits

Hot-Carrier Reliability of MOS VLSI Circuits

$169.00
Responsibility and Criminal Liability

Responsibility and Criminal Liability

$129.00
Computer Simulation Studies in Condensed-Matter Physics IX

Computer Simulation Studies in Condensed-Matter Physics IX

$109.99
Developments in Language Theory

Developments in Language Theory

$39.99
Radiationless Transitions in Polyatomic Molecules

Radiationless Transitions in Polyatomic Molecules

$109.99
Umweltinformationssysteme  Vielfalt, Offenheit, Komplexitt

Umweltinformationssysteme Vielfalt, Offenheit, Komplexitt

$89.99
Farbatlas der Histologie der Regenbogenforelle

Farbatlas der Histologie der Regenbogenforelle

$59.99
Semantic Multimedia

Semantic Multimedia

$54.99
Erfolgsfaktor Unternehmenskultur

Erfolgsfaktor Unternehmenskultur

$74.99
Management of Convergence in Innovation

Management of Convergence in Innovation

$169.99
Frontiers in Sociology of Education

Frontiers in Sociology of Education

$169.99
Corporate Nudging

Corporate Nudging

$49.99
Credit Correlation

Credit Correlation

$79.99
Advanced Batteries

Advanced Batteries

$249.99
HIV/AIDS in China

HIV/AIDS in China

$199.99
Gelebte Diversitt?

Gelebte Diversitt?

$39.99
Das Amalienhaus in Berlin-Charlottenburg

Das Amalienhaus in Berlin-Charlottenburg

$54.99
Model-Driven Dependability Assessment of Software Systems

Model-Driven Dependability Assessment of Software Systems

$109.99
The Intersection of Trauma and Disaster Behavioral Health

The Intersection of Trauma and Disaster Behavioral Health

$109.99
Der Tele-Tutor

Der Tele-Tutor

$39.99
Ballonkyphoplastie

Ballonkyphoplastie

$109.00
Excel 2010 for Business Statistics

Excel 2010 for Business Statistics

$84.99
previous
next