Search dblp for Publications

export results for "stream:streams/conf/sdmw:"

 download as .bib file

@proceedings{DBLP:conf/sdmw/2013,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06811-4},
  doi          = {10.1007/978-3-319-06811-4},
  isbn         = {978-3-319-06810-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Bertino13,
  author       = {Elisa Bertino},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Data Security - Challenges and Research Opportunities},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {9--13},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_2},
  doi          = {10.1007/978-3-319-06811-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Bertino13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BuyrukbilenB13,
  author       = {Sahin Buyrukbilen and
                  Spiridon Bakiras},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Similar Document Detection with Simhash},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_12},
  doi          = {10.1007/978-3-319-06811-4\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BuyrukbilenB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Camenisch13,
  author       = {Jan Camenisch},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Research Challenges to Secure the Future Internet},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {14--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_3},
  doi          = {10.1007/978-3-319-06811-4\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Camenisch13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DamenZ13,
  author       = {Stan Damen and
                  Nicola Zannone},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Implications of Privacy Settings and Tagging in Facebook},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {121--138},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_16},
  doi          = {10.1007/978-3-319-06811-4\_16},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DamenZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DemchenkoNLMG13,
  author       = {Yuri Demchenko and
                  Canh Ngo and
                  Cees de Laat and
                  Peter Membrey and
                  Daniil Gordijenko},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Big Security for Big Data: Addressing Security Challenges for the
                  Big Data Infrastructure},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {76--94},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_13},
  doi          = {10.1007/978-3-319-06811-4\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DemchenkoNLMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Jajodia13,
  author       = {Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Security and Privacy of Data in a Cloud},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {18--22},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_4},
  doi          = {10.1007/978-3-319-06811-4\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Jajodia13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JonkerP13,
  author       = {Willem Jonker and
                  Milan Petkovic},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Security, Privacy and Trust: From Innovation Blocker to Innovation
                  Enabler},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {54--58},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_11},
  doi          = {10.1007/978-3-319-06811-4\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JonkerP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Mehrotra13,
  author       = {Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards a Risk-Based Approach to Achieving Data Confidentiality in
                  Cloud Computing},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {42--47},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_9},
  doi          = {10.1007/978-3-319-06811-4\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Mehrotra13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Preneel13,
  author       = {Bart Preneel},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {The Future of Information Security Research: Cryptology and Beyond},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {23--27},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_5},
  doi          = {10.1007/978-3-319-06811-4\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Preneel13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Rannenberg13,
  author       = {Kai Rannenberg},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Where Security Research Should Go in the Next Decade},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {28--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_6},
  doi          = {10.1007/978-3-319-06811-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Rannenberg13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SanamradK13,
  author       = {Tahmineh Sanamrad and
                  Donald Kossmann},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Query Log Attack on Encrypted Databases},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {95--107},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_14},
  doi          = {10.1007/978-3-319-06811-4\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SanamradK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Sasse13,
  author       = {Martina Angela Sasse},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {"Technology Should Be Smarter Than This!": {A} Vision for Overcoming
                  the Great Authentication Fatigue},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {33--36},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_7},
  doi          = {10.1007/978-3-319-06811-4\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Sasse13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Schunter13,
  author       = {Matthias Schunter},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Data Security and Privacy in 2025?},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {37--41},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_8},
  doi          = {10.1007/978-3-319-06811-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Schunter13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SepehriCD13,
  author       = {Maryam Sepehri and
                  Stelvio Cimato and
                  Ernesto Damiani},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Multi-Party Protocol for Privacy-Preserving Range Queries},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {108--120},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_15},
  doi          = {10.1007/978-3-319-06811-4\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SepehriCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Sion13,
  author       = {Radu Sion},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {To Cloud Or Not To? Musings on Clouds, Security and Big Data},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {3--5},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_1},
  doi          = {10.1007/978-3-319-06811-4\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Sion13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/karmetaC13,
  author       = {Antonio F. Skarmeta and
                  Mar{\'{\i}}a Victoria Moreno Cano},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Internet of Things - Security, Privacy and Trust Considerations},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {48--53},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_10},
  doi          = {10.1007/978-3-319-06811-4\_10},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/karmetaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BienvenuDS12,
  author       = {Meghyn Bienvenu and
                  Daniel Deutch and
                  Fabian M. Suchanek},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Provenance for Web 2.0 Data},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {148--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_10},
  doi          = {10.1007/978-3-642-32873-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BienvenuDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/CarminatiFG12,
  author       = {Barbara Carminati and
                  Elena Ferrari and
                  Michele Guglielmi},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Policies for Composed Emergencies in Support of Disaster Management},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_6},
  doi          = {10.1007/978-3-642-32873-2\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/CarminatiFG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DengNPBM12,
  author       = {Mina Deng and
                  Marco Nalin and
                  Milan Petkovic and
                  Ilaria Baroni and
                  Abitabile Marco},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards Trustworthy Health Platform Cloud},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_12},
  doi          = {10.1007/978-3-642-32873-2\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DengNPBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/HoreCDM12,
  author       = {Bijit Hore and
                  Ee{-}Chien Chang and
                  Mamadou H. Diallo and
                  Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Indexing Encrypted Documents for Supporting Efficient Keyword Search},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {93--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_7},
  doi          = {10.1007/978-3-642-32873-2\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/HoreCDM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JanuszKF12,
  author       = {Daniel Janusz and
                  Martin Kost and
                  Johann{-}Christoph Freytag},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Protocol for Linking Distributed Medical Data},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_4},
  doi          = {10.1007/978-3-642-32873-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JanuszKF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/KozakNZ12,
  author       = {Stepan Kozak and
                  David Novak and
                  Pavel Zezula},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Metric-Based Index for Similarity Cloud},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {130--147},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_9},
  doi          = {10.1007/978-3-642-32873-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/KozakNZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/MahmudO12,
  author       = {Md. Sadim Mahmud and
                  Sylvia L. Osborn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Tradeoff Analysis of Relational Database Storage of Privacy Preferences},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_1},
  doi          = {10.1007/978-3-642-32873-2\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/MahmudO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ShoaranTW12,
  author       = {Maryam Shoaran and
                  Alex Thomo and
                  Jens H. Weber},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Differential Privacy in Practice},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {14--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_2},
  doi          = {10.1007/978-3-642-32873-2\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ShoaranTW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ThorpeGRB12,
  author       = {Sean S. E. Thorpe and
                  Tyrone Grandison and
                  Indrajit Ray and
                  Abbie Barbir},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards Enabling Behavioral Trust among Participating Cloud Forensic
                  Data Center Agencies},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {156--161},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_11},
  doi          = {10.1007/978-3-642-32873-2\_11},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ThorpeGRB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WangDLD12,
  author       = {Wenqiang Wang and
                  Tien Tuan Anh Dinh and
                  Hock{-}Beng Lim and
                  Anwitaman Datta},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Cloud and the City: Facilitating Flexible Access Control over Data-Streams},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_5},
  doi          = {10.1007/978-3-642-32873-2\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/WangDLD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WhangG12,
  author       = {Steven Euijong Whang and
                  Hector Garcia{-}Molina},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Model for Quantifying Information Leakage},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {25--44},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_3},
  doi          = {10.1007/978-3-642-32873-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/WhangG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangJCM12,
  author       = {Chunwang Zhang and
                  Junjie Jin and
                  Ee{-}Chien Chang and
                  Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage
                  Services},
  booktitle    = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  pages        = {111--129},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2\_8},
  doi          = {10.1007/978-3-642-32873-2\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangJCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2012,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul,
                  Turkey, August 27, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7482},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32873-2},
  doi          = {10.1007/978-3-642-32873-2},
  isbn         = {978-3-642-32872-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BakirasN11,
  author       = {Spiridon Bakiras and
                  Konstantinos F. Nikolopoulos},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Adjusting the Trade-Off between Privacy Guarantees and Computational
                  Cost in Secure Hardware {PIR}},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_9},
  doi          = {10.1007/978-3-642-23556-6\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BakirasN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BanerjeeAWB11,
  author       = {Mishtu Banerjee and
                  Rosa Karimi Adl and
                  Leanne Wu and
                  Ken Barker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Quantifying Privacy Violations},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_1},
  doi          = {10.1007/978-3-642-23556-6\_1},
  timestamp    = {Mon, 24 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BanerjeeAWB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BoschBHJ11,
  author       = {Christoph B{\"{o}}sch and
                  Richard Brinkman and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Conjunctive Wildcard Search over Encrypted Data},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_8},
  doi          = {10.1007/978-3-642-23556-6\_8},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BoschBHJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/CampanCT11,
  author       = {Alina Campan and
                  Nicholas Cooper and
                  Traian Marius Truta},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_2},
  doi          = {10.1007/978-3-642-23556-6\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/CampanCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChoiCCS11,
  author       = {Haksoo Choi and
                  Supriyo Chakraborty and
                  Zainul Charbiwala and
                  Mani B. Srivastava},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {SensorSafe: {A} Framework for Privacy-Preserving Management of Personal
                  Sensory Information},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {85--100},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_6},
  doi          = {10.1007/978-3-642-23556-6\_6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChoiCCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JarnikovD11,
  author       = {Dmitri Jarnikov and
                  Jeroen Doumen},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Watermarking for Adaptive Streaming Protocols},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_7},
  doi          = {10.1007/978-3-642-23556-6\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JarnikovD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PetkovicPZ11,
  author       = {Milan Petkovic and
                  Davide Prandi and
                  Nicola Zannone},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Purpose Control: Did You Process the Data for the Intended Purpose?},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {145--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_10},
  doi          = {10.1007/978-3-642-23556-6\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PetkovicPZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PoolsappasitKMC11,
  author       = {Nayot Poolsappasit and
                  Vimal Kumar and
                  Sanjay Madria and
                  Sriram Chellappan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Challenges in Secure Sensor-Cloud Computing},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {70--84},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_5},
  doi          = {10.1007/978-3-642-23556-6\_5},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PoolsappasitKMC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WangAA11,
  author       = {Shiyuan Wang and
                  Divyakant Agrawal and
                  Amr El Abbadi},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Comprehensive Framework for Secure Query Processing on Relational
                  Data in the Cloud},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_4},
  doi          = {10.1007/978-3-642-23556-6\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/WangAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/XiaoWT11,
  author       = {Qian Xiao and
                  Zhengkui Wang and
                  Kian{-}Lee Tan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{LORA:} Link Obfuscation by Randomization in Graphs},
  booktitle    = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  pages        = {33--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6\_3},
  doi          = {10.1007/978-3-642-23556-6\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/XiaoWT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2011,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle,
                  WA, USA, September 2, 2011, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6933},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23556-6},
  doi          = {10.1007/978-3-642-23556-6},
  isbn         = {978-3-642-23555-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ArmellinBCCMS10,
  author       = {Giampaolo Armellin and
                  Dario Betti and
                  Fabio Casati and
                  Annamaria Chiasera and
                  Gloria Mart{\'{\i}}nez and
                  Jovan Stevovic},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Preserving Event Driven Integration for Interoperating Social
                  and Health Systems},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {54--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_5},
  doi          = {10.1007/978-3-642-15546-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ArmellinBCCMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BertinoL10,
  author       = {Elisa Bertino and
                  Hyo{-}Sang Lim},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Assuring Data Trustworthiness - Concepts and Research Challenges},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_1},
  doi          = {10.1007/978-3-642-15546-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BertinoL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BlancoFTJ10,
  author       = {Carlos Blanco and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Juan Trujillo and
                  Jan J{\"{u}}rjens},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards the Secure Modelling of {OLAP} Users' Behaviour},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {101--112},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_8},
  doi          = {10.1007/978-3-642-15546-8\_8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BlancoFTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/CampanC10,
  author       = {Alina Campan and
                  Nicholas Cooper},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {13--25},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_2},
  doi          = {10.1007/978-3-642-15546-8\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/CampanC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/CarbunarS10,
  author       = {Bogdan Carbunar and
                  Radu Sion},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Joining Privately on Outsourced Data},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {70--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_6},
  doi          = {10.1007/978-3-642-15546-8\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/CarbunarS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/KhuratGA10,
  author       = {Assadarat Khurat and
                  Dieter Gollmann and
                  Joerg Abendroth},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Formal {P3P} Semantics for Composite Services},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {113--131},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_9},
  doi          = {10.1007/978-3-642-15546-8\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/KhuratGA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10,
  author       = {Peter van Liesdonk and
                  Saeed Sedghi and
                  Jeroen Doumen and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Computationally Efficient Searchable Symmetric Encryption},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_7},
  doi          = {10.1007/978-3-642-15546-8\_7},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/QuocD10,
  author       = {Phuong Huynh Van Quoc and
                  Tran Khanh Dang},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {eM\({}^{\mbox{2}}\): An Efficient Member Migration Algorithm for Ensuring
                  k-Anonymity and Mitigating Information Loss},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {26--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_3},
  doi          = {10.1007/978-3-642-15546-8\_3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/QuocD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SachanEK10,
  author       = {Amit Sachan and
                  Sabu Emmanuel and
                  Mohan S. Kankanhalli},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Geometric Approach for Efficient Licenses Validation in {DRM}},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {132--149},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_10},
  doi          = {10.1007/978-3-642-15546-8\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SachanEK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/XiaoXY10,
  author       = {Yonghui Xiao and
                  Li Xiong and
                  Chun Yuan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Differentially Private Data Release through Multidimensional Partitioning},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {150--168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_11},
  doi          = {10.1007/978-3-642-15546-8\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/XiaoXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/YahalomSZ10,
  author       = {Ran Yahalom and
                  Erez Shmueli and
                  Tomer Zrihen},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Constrained Anonymization of Production Data: {A} Constraint Satisfaction
                  Problem Approach},
  booktitle    = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  pages        = {41--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8\_4},
  doi          = {10.1007/978-3-642-15546-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/YahalomSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2010,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore,
                  September 17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6358},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15546-8},
  doi          = {10.1007/978-3-642-15546-8},
  isbn         = {978-3-642-15545-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/CanimKI09,
  author       = {Mustafa Canim and
                  Murat Kantarcioglu and
                  Ali Inan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Query Optimization in Encrypted Relational Databases by Vertical Schema
                  Partitioning},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_1},
  doi          = {10.1007/978-3-642-04219-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/CanimKI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DaiLKBCT09,
  author       = {Chenyun Dai and
                  Dan Lin and
                  Murat Kantarcioglu and
                  Elisa Bertino and
                  Ebru Celikel and
                  Bhavani Thuraisingham},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Query Processing Techniques for Compliance with Data Confidence Policies},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {49--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_4},
  doi          = {10.1007/978-3-642-04219-5\_4},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ImineCR09,
  author       = {Abdessamad Imine and
                  Asma Cherif and
                  Micha{\"{e}}l Rusinowitch},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Flexible Access Control Model for Distributed Collaborative Editors},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_6},
  doi          = {10.1007/978-3-642-04219-5\_6},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ImineCR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/KoromilasCFI09,
  author       = {Lazaros Koromilas and
                  George Chinis and
                  Irini Fundulaki and
                  Sotiris Ioannidis},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Controlling Access to {XML} Documents over {XML} Native and Relational
                  Databases},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {122--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_8},
  doi          = {10.1007/978-3-642-04219-5\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/KoromilasCFI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/MascettiBF09,
  author       = {Sergio Mascetti and
                  Claudio Bettini and
                  Dario Freni},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Longitude: Centralized Privacy-Preserving Computation of Users' Proximity},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_9},
  doi          = {10.1007/978-3-642-04219-5\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/MascettiBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/NiXBSH09,
  author       = {Qun Ni and
                  Shouhuai Xu and
                  Elisa Bertino and
                  Ravi S. Sandhu and
                  Weili Han},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Access Control Language for a General Provenance Model},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {68--88},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_5},
  doi          = {10.1007/978-3-642-04219-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/NiXBSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PowerSS09,
  author       = {David J. Power and
                  Mark Slaymaker and
                  Andrew C. Simpson},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {On the Construction and Verification of Self-modifying Access Control
                  Policies},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_7},
  doi          = {10.1007/978-3-642-04219-5\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PowerSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WuOJ09,
  author       = {Garfield Zhiping Wu and
                  Sylvia L. Osborn and
                  Xin Jin},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Database Intrusion Detection Using Role Profiling with Role Hierarchy},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_3},
  doi          = {10.1007/978-3-642-04219-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/WuOJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangCL09,
  author       = {Jing Zhang and
                  Adriane Chapman and
                  Kristen LeFevre},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_2},
  doi          = {10.1007/978-3-642-04219-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangWJB09,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {L-Cover: Preserving Diversity by Anonymity},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_10},
  doi          = {10.1007/978-3-642-04219-5\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2009,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5},
  doi          = {10.1007/978-3-642-04219-5},
  isbn         = {978-3-642-04218-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/AntoniouBU08,
  author       = {Giannakis Antoniou and
                  Lynn Margaret Batten and
                  Parampalli Udaya},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Trusted Approach to E-Commerce},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_8},
  doi          = {10.1007/978-3-540-85259-9\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/AntoniouBU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ08,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {How Anonymous Is k-Anonymous? Look at Your Quasi-ID},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_1},
  doi          = {10.1007/978-3-540-85259-9\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChiaseraCDV08,
  author       = {Annamaria Chiasera and
                  Fabio Casati and
                  Florian Daniel and
                  Yannis Velegrakis},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Engineering Privacy Requirements in Business Intelligence Applications},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {219--228},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_15},
  doi          = {10.1007/978-3-540-85259-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChiaseraCDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DaiLBK08,
  author       = {Chenyun Dai and
                  Dan Lin and
                  Elisa Bertino and
                  Murat Kantarcioglu},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Approach to Evaluate Data Trustworthiness Based on Data Provenance},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {82--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_6},
  doi          = {10.1007/978-3-540-85259-9\_6},
  timestamp    = {Tue, 14 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/DaiLBK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Domingo-FerrerSS08,
  author       = {Josep Domingo{-}Ferrer and
                  Francesc Seb{\'{e}} and
                  Agusti Solanas},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Anonymity Model Achievable Via Microaggregation},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {209--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_14},
  doi          = {10.1007/978-3-540-85259-9\_14},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Domingo-FerrerSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/FouadLB08,
  author       = {Mohamed R. Fouad and
                  Guy Lebanon and
                  Elisa Bertino},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{ARUBA:} {A} Risk-Utility-Based Algorithm for Data Disclosure},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {32--49},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_3},
  doi          = {10.1007/978-3-540-85259-9\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/FouadLB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/GianiniD08,
  author       = {Gabriele Gianini and
                  Ernesto Damiani},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Game-Theoretical Approach to Data-Privacy Protection from Context-Based
                  Inference Attacks: {A} Location-Privacy Protection Case Study},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_9},
  doi          = {10.1007/978-3-540-85259-9\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/GianiniD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/GoyalGSG08,
  author       = {Vikram Goyal and
                  Shyam K. Gupta and
                  Manish Singh and
                  Anand Gupta},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Auditing Inference Based Disclosures in Dynamic Databases},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_5},
  doi          = {10.1007/978-3-540-85259-9\_5},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/GoyalGSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/IbraimiTHJ08,
  author       = {Luan Ibraimi and
                  Qiang Tang and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application
                  in Healthcare},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {185--198},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_12},
  doi          = {10.1007/978-3-540-85259-9\_12},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/IbraimiTHJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/KamraBN08,
  author       = {Ashish Kamra and
                  Elisa Bertino and
                  Rimma V. Nehme},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Responding to Anomalous Database Requests},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {50--66},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_4},
  doi          = {10.1007/978-3-540-85259-9\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/KamraBN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/KargerOB08,
  author       = {Philipp K{\"{a}}rger and
                  Daniel Olmedilla and
                  Wolf{-}Tilo Balke},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven
                  Trust Negotiations},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {99--118},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_7},
  doi          = {10.1007/978-3-540-85259-9\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/KargerOB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LiC08,
  author       = {Jian Li and
                  William K. Cheung},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Query Rewriting for Access Control on Semantic Web},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_10},
  doi          = {10.1007/978-3-540-85259-9\_10},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LiC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ShumOW08,
  author       = {Candy Wai{-}Yue Shum and
                  Sylvia L. Osborn and
                  He Wang},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Methodology for Bridging between {RBAC} and an Arbitrary Application
                  Program},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {199--208},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_13},
  doi          = {10.1007/978-3-540-85259-9\_13},
  timestamp    = {Sat, 06 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/ShumOW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SlaymakerPRS08,
  author       = {Mark Slaymaker and
                  David J. Power and
                  Douglas Russell and
                  Andrew Simpson},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {On the Facilitation of Fine-Grained Access to Distributed Healthcare
                  Data},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_11},
  doi          = {10.1007/978-3-540-85259-9\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SlaymakerPRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangJB08,
  author       = {Lei Zhang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Simulatable Binding: Beyond Simulatable Auditing},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_2},
  doi          = {10.1007/978-3-540-85259-9\_2},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2008,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9},
  doi          = {10.1007/978-3-540-85259-9},
  isbn         = {978-3-540-85258-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BhattiG07,
  author       = {Rafae Bhatti and
                  Tyrone Grandison},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Towards Improved Privacy Policy Coverage in Healthcare Using Policy
                  Refinement},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_11},
  doi          = {10.1007/978-3-540-75248-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BhattiG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BoldtCLL07,
  author       = {Martin Boldt and
                  Bengt Carlsson and
                  Tobias Larsson and
                  Niklas Lind{\'{e}}n},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Preventing Privacy-Invasive Software Using Collaborative Reputation
                  Systems},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {142--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_10},
  doi          = {10.1007/978-3-540-75248-6\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BoldtCLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrodskyZJ07,
  author       = {Alexander Brodsky and
                  Lei Zhang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Answering Queries Based on Imprecision and Uncertainty Trade-Offs
                  in Numeric Databases},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_6},
  doi          = {10.1007/978-3-540-75248-6\_6},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrodskyZJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChengT07,
  author       = {Weiwei Cheng and
                  Kian{-}Lee Tan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Authenticating kNN Query Results in Data Publishing},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {47--63},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_4},
  doi          = {10.1007/978-3-540-75248-6\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChengT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChinaeiCT07,
  author       = {Amir H. Chinaei and
                  Hamid R. Chinaei and
                  Frank Wm. Tompa},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Unified Conflict Resolution Algorithm},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_1},
  doi          = {10.1007/978-3-540-75248-6\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChinaeiCT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DekkerE07,
  author       = {M. A. C. Dekker and
                  Sandro Etalle},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Refinement for Administrative Policies},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_3},
  doi          = {10.1007/978-3-540-75248-6\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DekkerE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Domingo-Ferrer07,
  author       = {Josep Domingo{-}Ferrer},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Three-Dimensional Conceptual Framework for Database Privacy},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {193--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_14},
  doi          = {10.1007/978-3-540-75248-6\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Domingo-Ferrer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/HasanWS07,
  author       = {Ragib Hasan and
                  Marianne Winslett and
                  Radu Sion},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Requirements of Secure Storage Systems for Healthcare Records},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {174--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_12},
  doi          = {10.1007/978-3-540-75248-6\_12},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/HasanWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JinO07,
  author       = {Xin Jin and
                  Sylvia L. Osborn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Architecture for Data Collection in Database Intrusion Detection Systems},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {96--107},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_7},
  doi          = {10.1007/978-3-540-75248-6\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JinO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LoY07,
  author       = {Nai{-}Wei Lo and
                  Kuo{-}Hui Yeh},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Novel {RFID} Authentication Schemes for Security Enhancement and System
                  Efficiency},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_15},
  doi          = {10.1007/978-3-540-75248-6\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LoY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PamunuwaWF07,
  author       = {Hasika Pamunuwa and
                  Duminda Wijesekera and
                  Csilla Farkas},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Intrusion Detection System for Detecting Phishing Attacks},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {181--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_13},
  doi          = {10.1007/978-3-540-75248-6\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PamunuwaWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Pfitzmann07,
  author       = {Birgit Pfitzmann},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Multi-layer Audit of Access Rights},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_2},
  doi          = {10.1007/978-3-540-75248-6\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Pfitzmann07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Rassadko07,
  author       = {Nataliya Rassadko},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Query Rewriting Algorithm Evaluation for {XML} Security Views},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {64--80},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_5},
  doi          = {10.1007/978-3-540-75248-6\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Rassadko07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/TrutaCM07,
  author       = {Traian Marius Truta and
                  Alina Campan and
                  Paul Meyer},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Generating Microdata with \emph{P} -Sensitive \emph{K} -Anonymity
                  Property},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {124--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_9},
  doi          = {10.1007/978-3-540-75248-6\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/TrutaCM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WangWP07,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted
                  Data},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {108--123},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_8},
  doi          = {10.1007/978-3-540-75248-6\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/WangWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2007,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6},
  doi          = {10.1007/978-3-540-75248-6},
  isbn         = {978-3-540-75247-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/AnJC06,
  author       = {Xiangdong An and
                  Dawn N. Jutla and
                  Nick Cercone},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Temporal Context Lie Detection and Generation},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {30--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_3},
  doi          = {10.1007/11844662\_3},
  timestamp    = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/AnJC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BottcherO06,
  author       = {Stefan B{\"{o}}ttcher and
                  Sebastian Obermeier},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Sovereign Information Sharing Among Malicious Partners},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {18--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_2},
  doi          = {10.1007/11844662\_2},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BottcherO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BottcherS06,
  author       = {Stefan B{\"{o}}ttcher and
                  Rita Steinmetz},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Information Disclosure by XPath Queries},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_12},
  doi          = {10.1007/11844662\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BottcherS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ByunP06,
  author       = {Changwoo Byun and
                  Seog Park},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Two Phase Filtering for {XML} Access Control},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_9},
  doi          = {10.1007/11844662\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ByunP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ByunRPL06,
  author       = {Jin Wook Byun and
                  Hyun Suk Rhee and
                  Hyun{-}A Park and
                  Dong Hoon Lee},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes
                  over Encrypted Data},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {75--83},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_6},
  doi          = {10.1007/11844662\_6},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/ByunRPL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ByunSBL06,
  author       = {Ji{-}Won Byun and
                  Yonglak Sohn and
                  Elisa Bertino and
                  Ninghui Li},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Anonymization for Incremental Datasets},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_4},
  doi          = {10.1007/11844662\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ByunSBL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChinaeiZ06,
  author       = {Amir H. Chinaei and
                  Huaxin Zhang},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Hybrid Authorizations and Conflict Resolution},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_10},
  doi          = {10.1007/11844662\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChinaeiZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Hacigumus06,
  author       = {Hakan Hacig{\"{u}}m{\"{u}}s},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{SPIDER:} An Autonomic Computing Approach to Database Security Management},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {175--183},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_13},
  doi          = {10.1007/11844662\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Hacigumus06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Kuhn06,
  author       = {Ulrich K{\"{u}}hn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Analysis of a Database and Index Encryption Scheme - Problems and
                  Fixes},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {146--159},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_11},
  doi          = {10.1007/11844662\_11},
  timestamp    = {Mon, 05 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/Kuhn06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PrasadR06,
  author       = {P. Krishna Prasad and
                  C. Pandu Rangan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy Preserving {BIRCH} Algorithm for Clustering over Vertically
                  Partitioned Databases},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_7},
  doi          = {10.1007/11844662\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PrasadR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/RheeJBL06,
  author       = {Hyun Sook Rhee and
                  Ik Rae Jeong and
                  Jin Wook Byun and
                  Dong Hoon Lee},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Difference Set Attacks on Conjunctive Keyword Search Schemes},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {64--74},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_5},
  doi          = {10.1007/11844662\_5},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/RheeJBL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SongO06,
  author       = {Yunyu Song and
                  Sylvia L. Osborn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Conflict of Interest in the Administrative Role Graph Model},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {100--114},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_8},
  doi          = {10.1007/11844662\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SongO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/YaoWWJ06,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Indistinguishability: The Other Aspect of Privacy},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_1},
  doi          = {10.1007/11844662\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2006,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662},
  doi          = {10.1007/11844662},
  isbn         = {978-3-540-38984-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ05,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Protecting Privacy Against Location-Based Personal Identification},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_13},
  doi          = {10.1007/11552338\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BottcherS05,
  author       = {Stefan B{\"{o}}ttcher and
                  Rita Steinmetz},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Detecting Privacy Violations in Sensitive {XML} Databases},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_10},
  doi          = {10.1007/11552338\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BottcherS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05,
  author       = {Richard Brinkman and
                  Berry Schoenmakers and
                  Jeroen Doumen and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Experiments with Queries over Encrypted Data Using Secret Sharing},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_3},
  doi          = {10.1007/11552338\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ChinaeiT05,
  author       = {Amir H. Chinaei and
                  Frank Wm. Tompa},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {User-Managed Access Control for Health Care Systems},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {63--72},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_5},
  doi          = {10.1007/11552338\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ChinaeiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DamianiVFJPS05,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Metadata Management in Outsourced Encrypted Databases},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_2},
  doi          = {10.1007/11552338\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DamianiVFJPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DragovicP05,
  author       = {Boris Dragovic and
                  Calicrates Policroniades},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Information SeeSaw: Availability vs. Security Management in the UbiComp
                  World},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {200--216},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_14},
  doi          = {10.1007/11552338\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DragovicP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Gabillon05,
  author       = {Alban Gabillon},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Formal Access Control Model for {XML} Databases},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_7},
  doi          = {10.1007/11552338\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Gabillon05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/HacigumusM05,
  author       = {Hakan Hacig{\"{u}}m{\"{u}}s and
                  Sharad Mehrotra},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Efficient Key Updates in Encrypted Database Systems},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_1},
  doi          = {10.1007/11552338\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/HacigumusM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/HintogluS05,
  author       = {Ay{\c{c}}a Azgin Hintoglu and
                  Y{\"{u}}cel Saygin},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Suppressing Microdata to Prevent Probabilistic Classification Based
                  Inference},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_11},
  doi          = {10.1007/11552338\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/HintogluS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/IonitaO05,
  author       = {Cecilia Ionita and
                  Sylvia L. Osborn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Specifying an Access Control Model for Ontologies for the Semantic
                  Web},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_6},
  doi          = {10.1007/11552338\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/IonitaO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/NairGMM05,
  author       = {Gopakumar Nair and
                  Ajeesh Gopalakrishnan and
                  Sjouke Mauw and
                  Erik Moll},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{XML} Security in the Next Generation Optical Disc Context},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {217--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_15},
  doi          = {10.1007/11552338\_15},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/NairGMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PowerSS05,
  author       = {David J. Power and
                  Mark Slaymaker and
                  Andrew C. Simpson},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {On Deducibility and Anonymisation in Medical Databases},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {170--184},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_12},
  doi          = {10.1007/11552338\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PowerSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Ramesh05,
  author       = {Ganesh Ramesh},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Can Attackers Learn from Samples?},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {104--123},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_8},
  doi          = {10.1007/11552338\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Ramesh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/TolandFE05,
  author       = {Tyrone S. Toland and
                  Csilla Farkas and
                  Caroline M. Eastman},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Dynamic Disclosure Monitor (\emph{D}\({}^{\mbox{\emph{2}}}\)\emph{Mon}):
                  An Improved Query Processing Solution},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {124--142},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_9},
  doi          = {10.1007/11552338\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/TolandFE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/WimmerK05,
  author       = {Martin Wimmer and
                  Alfons Kemper},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Authorization Framework for Sharing Data in Web Service Federations},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_4},
  doi          = {10.1007/11552338\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/WimmerK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Yuan05,
  author       = {Yumin Yuan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {234--240},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_16},
  doi          = {10.1007/11552338\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Yuan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2005,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338},
  doi          = {10.1007/11552338},
  isbn         = {3-540-28798-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ04,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Identifying Sensitive Associations in Databases for Release Control},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_14},
  doi          = {10.1007/978-3-540-30073-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrinkmanDJ04,
  author       = {Richard Brinkman and
                  Jeroen Doumen and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Using Secret Sharing for Searching in Encrypted Data},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {18--27},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_2},
  doi          = {10.1007/978-3-540-30073-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrinkmanDJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ConradoPJ04,
  author       = {Claudine Conrado and
                  Milan Petkovic and
                  Willem Jonker},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Privacy-Preserving Digital Rights Management},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {83--99},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_7},
  doi          = {10.1007/978-3-540-30073-1\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ConradoPJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/EloviciWSG04,
  author       = {Yuval Elovici and
                  Ronen Waisenberg and
                  Erez Shmueli and
                  Ehud Gudes},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Structure Preserving Database Encryption Scheme},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_3},
  doi          = {10.1007/978-3-540-30073-1\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/EloviciWSG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JayapandianNMJ04,
  author       = {Magesh Jayapandian and
                  Brian D. Noble and
                  James W. Mickens and
                  H. V. Jagadish},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Using Delay to Defend Against Database Extraction},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {202--218},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_15},
  doi          = {10.1007/978-3-540-30073-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JayapandianNMJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/JutlaBG04,
  author       = {Dawn N. Jutla and
                  Peter Bodorik and
                  Deyun Gao},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Management of Private Data: Addressing User Privacy and Economic,
                  Social, and Ethical Concerns},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {100--117},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_8},
  doi          = {10.1007/978-3-540-30073-1\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/JutlaBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LinC04,
  author       = {Ping Lin and
                  K. Sel{\c{c}}uk Candan},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure and Privacy Preserving Outsourcing of Tree Structured Data},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_1},
  doi          = {10.1007/978-3-540-30073-1\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/LinC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/LuoLLL04,
  author       = {Bo Luo and
                  Dongwon Lee and
                  Wang{-}Chien Lee and
                  Peng Liu},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Flexible Framework for Architecting {XML} Access Control Enforcement
                  Mechanisms},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_10},
  doi          = {10.1007/978-3-540-30073-1\_10},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/LuoLLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/MiklauS04,
  author       = {Gerome Miklau and
                  Dan Suciu},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Modeling Integrity in Data Exchange},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_4},
  doi          = {10.1007/978-3-540-30073-1\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/MiklauS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/NejdlOW04,
  author       = {Wolfgang Nejdl and
                  Daniel Olmedilla and
                  Marianne Winslett},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_9},
  doi          = {10.1007/978-3-540-30073-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/NejdlOW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/OliveiraZ04,
  author       = {Stanley R. M. Oliveira and
                  Osmar R. Za{\"{\i}}ane},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Achieving Privacy Preservation when Sharing Data for Clustering},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {67--82},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_6},
  doi          = {10.1007/978-3-540-30073-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/OliveiraZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/RosenthalS04,
  author       = {Arnon Rosenthal and
                  Edward Sciore},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Abstracting and Refining Authorization in {SQL}},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_11},
  doi          = {10.1007/978-3-540-30073-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/RosenthalS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ShengO04,
  author       = {Shengli Sheng and
                  Sylvia L. Osborn},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {A Classifier-Based Approach to User-Role Assignment for Web Applications},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {163--171},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_12},
  doi          = {10.1007/978-3-540-30073-1\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ShengO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/SubramaniamWY04,
  author       = {Hiranmayee Subramaniam and
                  Rebecca N. Wright and
                  Zhiqiang Yang},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Experimental Analysis of Privacy-Preserving Statistics Computation},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_5},
  doi          = {10.1007/978-3-540-30073-1\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/SubramaniamWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/YuL04,
  author       = {Hai Yu and
                  Ee{-}Peng Lim},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {{LTAM:} {A} Location-Temporal Authorization Model},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_13},
  doi          = {10.1007/978-3-540-30073-1\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/YuL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sdmw/2004,
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b99822},
  doi          = {10.1007/B99822},
  isbn         = {3-540-22983-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics