Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/sdmw:"
@proceedings{DBLP:conf/sdmw/2013, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06811-4}, doi = {10.1007/978-3-319-06811-4}, isbn = {978-3-319-06810-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Bertino13, author = {Elisa Bertino}, editor = {Willem Jonker and Milan Petkovic}, title = {Data Security - Challenges and Research Opportunities}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {9--13}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_2}, doi = {10.1007/978-3-319-06811-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Bertino13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BuyrukbilenB13, author = {Sahin Buyrukbilen and Spiridon Bakiras}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Similar Document Detection with Simhash}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {61--75}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_12}, doi = {10.1007/978-3-319-06811-4\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BuyrukbilenB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Camenisch13, author = {Jan Camenisch}, editor = {Willem Jonker and Milan Petkovic}, title = {Research Challenges to Secure the Future Internet}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {14--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_3}, doi = {10.1007/978-3-319-06811-4\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Camenisch13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DamenZ13, author = {Stan Damen and Nicola Zannone}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Implications of Privacy Settings and Tagging in Facebook}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {121--138}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_16}, doi = {10.1007/978-3-319-06811-4\_16}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DamenZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DemchenkoNLMG13, author = {Yuri Demchenko and Canh Ngo and Cees de Laat and Peter Membrey and Daniil Gordijenko}, editor = {Willem Jonker and Milan Petkovic}, title = {Big Security for Big Data: Addressing Security Challenges for the Big Data Infrastructure}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {76--94}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_13}, doi = {10.1007/978-3-319-06811-4\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DemchenkoNLMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Jajodia13, author = {Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Security and Privacy of Data in a Cloud}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {18--22}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_4}, doi = {10.1007/978-3-319-06811-4\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Jajodia13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JonkerP13, author = {Willem Jonker and Milan Petkovic}, editor = {Willem Jonker and Milan Petkovic}, title = {Security, Privacy and Trust: From Innovation Blocker to Innovation Enabler}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {54--58}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_11}, doi = {10.1007/978-3-319-06811-4\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JonkerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Mehrotra13, author = {Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {42--47}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_9}, doi = {10.1007/978-3-319-06811-4\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Mehrotra13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Preneel13, author = {Bart Preneel}, editor = {Willem Jonker and Milan Petkovic}, title = {The Future of Information Security Research: Cryptology and Beyond}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {23--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_5}, doi = {10.1007/978-3-319-06811-4\_5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Preneel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Rannenberg13, author = {Kai Rannenberg}, editor = {Willem Jonker and Milan Petkovic}, title = {Where Security Research Should Go in the Next Decade}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {28--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_6}, doi = {10.1007/978-3-319-06811-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Rannenberg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SanamradK13, author = {Tahmineh Sanamrad and Donald Kossmann}, editor = {Willem Jonker and Milan Petkovic}, title = {Query Log Attack on Encrypted Databases}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {95--107}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_14}, doi = {10.1007/978-3-319-06811-4\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SanamradK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Sasse13, author = {Martina Angela Sasse}, editor = {Willem Jonker and Milan Petkovic}, title = {"Technology Should Be Smarter Than This!": {A} Vision for Overcoming the Great Authentication Fatigue}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {33--36}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_7}, doi = {10.1007/978-3-319-06811-4\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Sasse13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Schunter13, author = {Matthias Schunter}, editor = {Willem Jonker and Milan Petkovic}, title = {Data Security and Privacy in 2025?}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {37--41}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_8}, doi = {10.1007/978-3-319-06811-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Schunter13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SepehriCD13, author = {Maryam Sepehri and Stelvio Cimato and Ernesto Damiani}, editor = {Willem Jonker and Milan Petkovic}, title = {A Multi-Party Protocol for Privacy-Preserving Range Queries}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {108--120}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_15}, doi = {10.1007/978-3-319-06811-4\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SepehriCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Sion13, author = {Radu Sion}, editor = {Willem Jonker and Milan Petkovic}, title = {To Cloud Or Not To? Musings on Clouds, Security and Big Data}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {3--5}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_1}, doi = {10.1007/978-3-319-06811-4\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Sion13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/karmetaC13, author = {Antonio F. Skarmeta and Mar{\'{\i}}a Victoria Moreno Cano}, editor = {Willem Jonker and Milan Petkovic}, title = {Internet of Things - Security, Privacy and Trust Considerations}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {48--53}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_10}, doi = {10.1007/978-3-319-06811-4\_10}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/karmetaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BienvenuDS12, author = {Meghyn Bienvenu and Daniel Deutch and Fabian M. Suchanek}, editor = {Willem Jonker and Milan Petkovic}, title = {Provenance for Web 2.0 Data}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {148--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_10}, doi = {10.1007/978-3-642-32873-2\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BienvenuDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/CarminatiFG12, author = {Barbara Carminati and Elena Ferrari and Michele Guglielmi}, editor = {Willem Jonker and Milan Petkovic}, title = {Policies for Composed Emergencies in Support of Disaster Management}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {75--92}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_6}, doi = {10.1007/978-3-642-32873-2\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/CarminatiFG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DengNPBM12, author = {Mina Deng and Marco Nalin and Milan Petkovic and Ilaria Baroni and Abitabile Marco}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards Trustworthy Health Platform Cloud}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {162--175}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_12}, doi = {10.1007/978-3-642-32873-2\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DengNPBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/HoreCDM12, author = {Bijit Hore and Ee{-}Chien Chang and Mamadou H. Diallo and Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Indexing Encrypted Documents for Supporting Efficient Keyword Search}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {93--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_7}, doi = {10.1007/978-3-642-32873-2\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/HoreCDM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JanuszKF12, author = {Daniel Janusz and Martin Kost and Johann{-}Christoph Freytag}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Protocol for Linking Distributed Medical Data}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {45--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_4}, doi = {10.1007/978-3-642-32873-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JanuszKF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/KozakNZ12, author = {Stepan Kozak and David Novak and Pavel Zezula}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Metric-Based Index for Similarity Cloud}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {130--147}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_9}, doi = {10.1007/978-3-642-32873-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/KozakNZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/MahmudO12, author = {Md. Sadim Mahmud and Sylvia L. Osborn}, editor = {Willem Jonker and Milan Petkovic}, title = {Tradeoff Analysis of Relational Database Storage of Privacy Preferences}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {1--13}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_1}, doi = {10.1007/978-3-642-32873-2\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/MahmudO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ShoaranTW12, author = {Maryam Shoaran and Alex Thomo and Jens H. Weber}, editor = {Willem Jonker and Milan Petkovic}, title = {Differential Privacy in Practice}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {14--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_2}, doi = {10.1007/978-3-642-32873-2\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ShoaranTW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ThorpeGRB12, author = {Sean S. E. Thorpe and Tyrone Grandison and Indrajit Ray and Abbie Barbir}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {156--161}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_11}, doi = {10.1007/978-3-642-32873-2\_11}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ThorpeGRB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WangDLD12, author = {Wenqiang Wang and Tien Tuan Anh Dinh and Hock{-}Beng Lim and Anwitaman Datta}, editor = {Willem Jonker and Milan Petkovic}, title = {Cloud and the City: Facilitating Flexible Access Control over Data-Streams}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {58--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_5}, doi = {10.1007/978-3-642-32873-2\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/WangDLD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WhangG12, author = {Steven Euijong Whang and Hector Garcia{-}Molina}, editor = {Willem Jonker and Milan Petkovic}, title = {A Model for Quantifying Information Leakage}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {25--44}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_3}, doi = {10.1007/978-3-642-32873-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/WhangG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangJCM12, author = {Chunwang Zhang and Junjie Jin and Ee{-}Chien Chang and Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services}, booktitle = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, pages = {111--129}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2\_8}, doi = {10.1007/978-3-642-32873-2\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangJCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2012, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 9th {VLDB} Workshop, {SDM} 2012, Istanbul, Turkey, August 27, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7482}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32873-2}, doi = {10.1007/978-3-642-32873-2}, isbn = {978-3-642-32872-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BakirasN11, author = {Spiridon Bakiras and Konstantinos F. Nikolopoulos}, editor = {Willem Jonker and Milan Petkovic}, title = {Adjusting the Trade-Off between Privacy Guarantees and Computational Cost in Secure Hardware {PIR}}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {128--144}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_9}, doi = {10.1007/978-3-642-23556-6\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BakirasN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BanerjeeAWB11, author = {Mishtu Banerjee and Rosa Karimi Adl and Leanne Wu and Ken Barker}, editor = {Willem Jonker and Milan Petkovic}, title = {Quantifying Privacy Violations}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {1--17}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_1}, doi = {10.1007/978-3-642-23556-6\_1}, timestamp = {Mon, 24 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BanerjeeAWB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BoschBHJ11, author = {Christoph B{\"{o}}sch and Richard Brinkman and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Conjunctive Wildcard Search over Encrypted Data}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {114--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_8}, doi = {10.1007/978-3-642-23556-6\_8}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BoschBHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/CampanCT11, author = {Alina Campan and Nicholas Cooper and Traian Marius Truta}, editor = {Willem Jonker and Milan Petkovic}, title = {On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {18--32}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_2}, doi = {10.1007/978-3-642-23556-6\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/CampanCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChoiCCS11, author = {Haksoo Choi and Supriyo Chakraborty and Zainul Charbiwala and Mani B. Srivastava}, editor = {Willem Jonker and Milan Petkovic}, title = {SensorSafe: {A} Framework for Privacy-Preserving Management of Personal Sensory Information}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {85--100}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_6}, doi = {10.1007/978-3-642-23556-6\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ChoiCCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JarnikovD11, author = {Dmitri Jarnikov and Jeroen Doumen}, editor = {Willem Jonker and Milan Petkovic}, title = {Watermarking for Adaptive Streaming Protocols}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {101--113}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_7}, doi = {10.1007/978-3-642-23556-6\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JarnikovD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PetkovicPZ11, author = {Milan Petkovic and Davide Prandi and Nicola Zannone}, editor = {Willem Jonker and Milan Petkovic}, title = {Purpose Control: Did You Process the Data for the Intended Purpose?}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {145--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_10}, doi = {10.1007/978-3-642-23556-6\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PetkovicPZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PoolsappasitKMC11, author = {Nayot Poolsappasit and Vimal Kumar and Sanjay Madria and Sriram Chellappan}, editor = {Willem Jonker and Milan Petkovic}, title = {Challenges in Secure Sensor-Cloud Computing}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {70--84}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_5}, doi = {10.1007/978-3-642-23556-6\_5}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PoolsappasitKMC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WangAA11, author = {Shiyuan Wang and Divyakant Agrawal and Amr El Abbadi}, editor = {Willem Jonker and Milan Petkovic}, title = {A Comprehensive Framework for Secure Query Processing on Relational Data in the Cloud}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {52--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_4}, doi = {10.1007/978-3-642-23556-6\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/WangAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/XiaoWT11, author = {Qian Xiao and Zhengkui Wang and Kian{-}Lee Tan}, editor = {Willem Jonker and Milan Petkovic}, title = {{LORA:} Link Obfuscation by Randomization in Graphs}, booktitle = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, pages = {33--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6\_3}, doi = {10.1007/978-3-642-23556-6\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/XiaoWT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2011, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management - 8th {VLDB} Workshop, {SDM} 2011, Seattle, WA, USA, September 2, 2011, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6933}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23556-6}, doi = {10.1007/978-3-642-23556-6}, isbn = {978-3-642-23555-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ArmellinBCCMS10, author = {Giampaolo Armellin and Dario Betti and Fabio Casati and Annamaria Chiasera and Gloria Mart{\'{\i}}nez and Jovan Stevovic}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Preserving Event Driven Integration for Interoperating Social and Health Systems}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {54--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_5}, doi = {10.1007/978-3-642-15546-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ArmellinBCCMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BertinoL10, author = {Elisa Bertino and Hyo{-}Sang Lim}, editor = {Willem Jonker and Milan Petkovic}, title = {Assuring Data Trustworthiness - Concepts and Research Challenges}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {1--12}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_1}, doi = {10.1007/978-3-642-15546-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BertinoL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BlancoFTJ10, author = {Carlos Blanco and Eduardo Fern{\'{a}}ndez{-}Medina and Juan Trujillo and Jan J{\"{u}}rjens}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards the Secure Modelling of {OLAP} Users' Behaviour}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {101--112}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_8}, doi = {10.1007/978-3-642-15546-8\_8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BlancoFTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/CampanC10, author = {Alina Campan and Nicholas Cooper}, editor = {Willem Jonker and Milan Petkovic}, title = {On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {13--25}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_2}, doi = {10.1007/978-3-642-15546-8\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/CampanC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/CarbunarS10, author = {Bogdan Carbunar and Radu Sion}, editor = {Willem Jonker and Milan Petkovic}, title = {Joining Privately on Outsourced Data}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {70--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_6}, doi = {10.1007/978-3-642-15546-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/CarbunarS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/KhuratGA10, author = {Assadarat Khurat and Dieter Gollmann and Joerg Abendroth}, editor = {Willem Jonker and Milan Petkovic}, title = {A Formal {P3P} Semantics for Composite Services}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {113--131}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_9}, doi = {10.1007/978-3-642-15546-8\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/KhuratGA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LiesdonkSDHJ10, author = {Peter van Liesdonk and Saeed Sedghi and Jeroen Doumen and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Computationally Efficient Searchable Symmetric Encryption}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {87--100}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_7}, doi = {10.1007/978-3-642-15546-8\_7}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LiesdonkSDHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/QuocD10, author = {Phuong Huynh Van Quoc and Tran Khanh Dang}, editor = {Willem Jonker and Milan Petkovic}, title = {eM\({}^{\mbox{2}}\): An Efficient Member Migration Algorithm for Ensuring k-Anonymity and Mitigating Information Loss}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {26--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_3}, doi = {10.1007/978-3-642-15546-8\_3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/QuocD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SachanEK10, author = {Amit Sachan and Sabu Emmanuel and Mohan S. Kankanhalli}, editor = {Willem Jonker and Milan Petkovic}, title = {A Geometric Approach for Efficient Licenses Validation in {DRM}}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {132--149}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_10}, doi = {10.1007/978-3-642-15546-8\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SachanEK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/XiaoXY10, author = {Yonghui Xiao and Li Xiong and Chun Yuan}, editor = {Willem Jonker and Milan Petkovic}, title = {Differentially Private Data Release through Multidimensional Partitioning}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {150--168}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_11}, doi = {10.1007/978-3-642-15546-8\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/XiaoXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/YahalomSZ10, author = {Ran Yahalom and Erez Shmueli and Tomer Zrihen}, editor = {Willem Jonker and Milan Petkovic}, title = {Constrained Anonymization of Production Data: {A} Constraint Satisfaction Problem Approach}, booktitle = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, pages = {41--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8\_4}, doi = {10.1007/978-3-642-15546-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/YahalomSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2010, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 7th {VLDB} Workshop, {SDM} 2010, Singapore, September 17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6358}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15546-8}, doi = {10.1007/978-3-642-15546-8}, isbn = {978-3-642-15545-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/CanimKI09, author = {Mustafa Canim and Murat Kantarcioglu and Ali Inan}, editor = {Willem Jonker and Milan Petkovic}, title = {Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {1--16}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_1}, doi = {10.1007/978-3-642-04219-5\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/CanimKI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DaiLKBCT09, author = {Chenyun Dai and Dan Lin and Murat Kantarcioglu and Elisa Bertino and Ebru Celikel and Bhavani Thuraisingham}, editor = {Willem Jonker and Milan Petkovic}, title = {Query Processing Techniques for Compliance with Data Confidence Policies}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {49--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_4}, doi = {10.1007/978-3-642-04219-5\_4}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DaiLKBCT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ImineCR09, author = {Abdessamad Imine and Asma Cherif and Micha{\"{e}}l Rusinowitch}, editor = {Willem Jonker and Milan Petkovic}, title = {A Flexible Access Control Model for Distributed Collaborative Editors}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {89--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_6}, doi = {10.1007/978-3-642-04219-5\_6}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ImineCR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/KoromilasCFI09, author = {Lazaros Koromilas and George Chinis and Irini Fundulaki and Sotiris Ioannidis}, editor = {Willem Jonker and Milan Petkovic}, title = {Controlling Access to {XML} Documents over {XML} Native and Relational Databases}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {122--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_8}, doi = {10.1007/978-3-642-04219-5\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/KoromilasCFI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/MascettiBF09, author = {Sergio Mascetti and Claudio Bettini and Dario Freni}, editor = {Willem Jonker and Milan Petkovic}, title = {Longitude: Centralized Privacy-Preserving Computation of Users' Proximity}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {142--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_9}, doi = {10.1007/978-3-642-04219-5\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/MascettiBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/NiXBSH09, author = {Qun Ni and Shouhuai Xu and Elisa Bertino and Ravi S. Sandhu and Weili Han}, editor = {Willem Jonker and Milan Petkovic}, title = {An Access Control Language for a General Provenance Model}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {68--88}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_5}, doi = {10.1007/978-3-642-04219-5\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/NiXBSH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PowerSS09, author = {David J. Power and Mark Slaymaker and Andrew C. Simpson}, editor = {Willem Jonker and Milan Petkovic}, title = {On the Construction and Verification of Self-modifying Access Control Policies}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {107--121}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_7}, doi = {10.1007/978-3-642-04219-5\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PowerSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WuOJ09, author = {Garfield Zhiping Wu and Sylvia L. Osborn and Xin Jin}, editor = {Willem Jonker and Milan Petkovic}, title = {Database Intrusion Detection Using Role Profiling with Role Hierarchy}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {33--48}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_3}, doi = {10.1007/978-3-642-04219-5\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/WuOJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangCL09, author = {Jing Zhang and Adriane Chapman and Kristen LeFevre}, editor = {Willem Jonker and Milan Petkovic}, title = {Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {17--32}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_2}, doi = {10.1007/978-3-642-04219-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangWJB09, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Willem Jonker and Milan Petkovic}, title = {L-Cover: Preserving Diversity by Anonymity}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {158--171}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_10}, doi = {10.1007/978-3-642-04219-5\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2009, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5}, doi = {10.1007/978-3-642-04219-5}, isbn = {978-3-642-04218-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/AntoniouBU08, author = {Giannakis Antoniou and Lynn Margaret Batten and Parampalli Udaya}, editor = {Willem Jonker and Milan Petkovic}, title = {A Trusted Approach to E-Commerce}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {119--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_8}, doi = {10.1007/978-3-540-85259-9\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/AntoniouBU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ08, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {How Anonymous Is k-Anonymous? Look at Your Quasi-ID}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_1}, doi = {10.1007/978-3-540-85259-9\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChiaseraCDV08, author = {Annamaria Chiasera and Fabio Casati and Florian Daniel and Yannis Velegrakis}, editor = {Willem Jonker and Milan Petkovic}, title = {Engineering Privacy Requirements in Business Intelligence Applications}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {219--228}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_15}, doi = {10.1007/978-3-540-85259-9\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/ChiaseraCDV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DaiLBK08, author = {Chenyun Dai and Dan Lin and Elisa Bertino and Murat Kantarcioglu}, editor = {Willem Jonker and Milan Petkovic}, title = {An Approach to Evaluate Data Trustworthiness Based on Data Provenance}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {82--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_6}, doi = {10.1007/978-3-540-85259-9\_6}, timestamp = {Tue, 14 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/DaiLBK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Domingo-FerrerSS08, author = {Josep Domingo{-}Ferrer and Francesc Seb{\'{e}} and Agusti Solanas}, editor = {Willem Jonker and Milan Petkovic}, title = {An Anonymity Model Achievable Via Microaggregation}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {209--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_14}, doi = {10.1007/978-3-540-85259-9\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Domingo-FerrerSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/FouadLB08, author = {Mohamed R. Fouad and Guy Lebanon and Elisa Bertino}, editor = {Willem Jonker and Milan Petkovic}, title = {{ARUBA:} {A} Risk-Utility-Based Algorithm for Data Disclosure}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {32--49}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_3}, doi = {10.1007/978-3-540-85259-9\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/FouadLB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/GianiniD08, author = {Gabriele Gianini and Ernesto Damiani}, editor = {Willem Jonker and Milan Petkovic}, title = {A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: {A} Location-Privacy Protection Case Study}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {133--150}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_9}, doi = {10.1007/978-3-540-85259-9\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/GianiniD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/GoyalGSG08, author = {Vikram Goyal and Shyam K. Gupta and Manish Singh and Anand Gupta}, editor = {Willem Jonker and Milan Petkovic}, title = {Auditing Inference Based Disclosures in Dynamic Databases}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {67--81}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_5}, doi = {10.1007/978-3-540-85259-9\_5}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/GoyalGSG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/IbraimiTHJ08, author = {Luan Ibraimi and Qiang Tang and Pieter H. Hartel and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {185--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_12}, doi = {10.1007/978-3-540-85259-9\_12}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/IbraimiTHJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/KamraBN08, author = {Ashish Kamra and Elisa Bertino and Rimma V. Nehme}, editor = {Willem Jonker and Milan Petkovic}, title = {Responding to Anomalous Database Requests}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {50--66}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_4}, doi = {10.1007/978-3-540-85259-9\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/KamraBN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/KargerOB08, author = {Philipp K{\"{a}}rger and Daniel Olmedilla and Wolf{-}Tilo Balke}, editor = {Willem Jonker and Milan Petkovic}, title = {Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {99--118}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_7}, doi = {10.1007/978-3-540-85259-9\_7}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/KargerOB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LiC08, author = {Jian Li and William K. Cheung}, editor = {Willem Jonker and Milan Petkovic}, title = {Query Rewriting for Access Control on Semantic Web}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {151--168}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_10}, doi = {10.1007/978-3-540-85259-9\_10}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LiC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ShumOW08, author = {Candy Wai{-}Yue Shum and Sylvia L. Osborn and He Wang}, editor = {Willem Jonker and Milan Petkovic}, title = {A Methodology for Bridging between {RBAC} and an Arbitrary Application Program}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {199--208}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_13}, doi = {10.1007/978-3-540-85259-9\_13}, timestamp = {Sat, 06 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/ShumOW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SlaymakerPRS08, author = {Mark Slaymaker and David J. Power and Douglas Russell and Andrew Simpson}, editor = {Willem Jonker and Milan Petkovic}, title = {On the Facilitation of Fine-Grained Access to Distributed Healthcare Data}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {169--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_11}, doi = {10.1007/978-3-540-85259-9\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SlaymakerPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangJB08, author = {Lei Zhang and Sushil Jajodia and Alexander Brodsky}, editor = {Willem Jonker and Milan Petkovic}, title = {Simulatable Binding: Beyond Simulatable Auditing}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {16--31}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_2}, doi = {10.1007/978-3-540-85259-9\_2}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangJB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2008, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9}, doi = {10.1007/978-3-540-85259-9}, isbn = {978-3-540-85258-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BhattiG07, author = {Rafae Bhatti and Tyrone Grandison}, editor = {Willem Jonker and Milan Petkovic}, title = {Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {158--173}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_11}, doi = {10.1007/978-3-540-75248-6\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BhattiG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BoldtCLL07, author = {Martin Boldt and Bengt Carlsson and Tobias Larsson and Niklas Lind{\'{e}}n}, editor = {Willem Jonker and Milan Petkovic}, title = {Preventing Privacy-Invasive Software Using Collaborative Reputation Systems}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {142--157}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_10}, doi = {10.1007/978-3-540-75248-6\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BoldtCLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrodskyZJ07, author = {Alexander Brodsky and Lei Zhang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {81--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_6}, doi = {10.1007/978-3-540-75248-6\_6}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/BrodskyZJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChengT07, author = {Weiwei Cheng and Kian{-}Lee Tan}, editor = {Willem Jonker and Milan Petkovic}, title = {Authenticating kNN Query Results in Data Publishing}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {47--63}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_4}, doi = {10.1007/978-3-540-75248-6\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ChengT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChinaeiCT07, author = {Amir H. Chinaei and Hamid R. Chinaei and Frank Wm. Tompa}, editor = {Willem Jonker and Milan Petkovic}, title = {A Unified Conflict Resolution Algorithm}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {1--17}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_1}, doi = {10.1007/978-3-540-75248-6\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ChinaeiCT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DekkerE07, author = {M. A. C. Dekker and Sandro Etalle}, editor = {Willem Jonker and Milan Petkovic}, title = {Refinement for Administrative Policies}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {33--46}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_3}, doi = {10.1007/978-3-540-75248-6\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DekkerE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Domingo-Ferrer07, author = {Josep Domingo{-}Ferrer}, editor = {Willem Jonker and Milan Petkovic}, title = {A Three-Dimensional Conceptual Framework for Database Privacy}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {193--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_14}, doi = {10.1007/978-3-540-75248-6\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Domingo-Ferrer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/HasanWS07, author = {Ragib Hasan and Marianne Winslett and Radu Sion}, editor = {Willem Jonker and Milan Petkovic}, title = {Requirements of Secure Storage Systems for Healthcare Records}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {174--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_12}, doi = {10.1007/978-3-540-75248-6\_12}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/HasanWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JinO07, author = {Xin Jin and Sylvia L. Osborn}, editor = {Willem Jonker and Milan Petkovic}, title = {Architecture for Data Collection in Database Intrusion Detection Systems}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {96--107}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_7}, doi = {10.1007/978-3-540-75248-6\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JinO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LoY07, author = {Nai{-}Wei Lo and Kuo{-}Hui Yeh}, editor = {Willem Jonker and Milan Petkovic}, title = {Novel {RFID} Authentication Schemes for Security Enhancement and System Efficiency}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {203--212}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_15}, doi = {10.1007/978-3-540-75248-6\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LoY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PamunuwaWF07, author = {Hasika Pamunuwa and Duminda Wijesekera and Csilla Farkas}, editor = {Willem Jonker and Milan Petkovic}, title = {An Intrusion Detection System for Detecting Phishing Attacks}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {181--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_13}, doi = {10.1007/978-3-540-75248-6\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PamunuwaWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Pfitzmann07, author = {Birgit Pfitzmann}, editor = {Willem Jonker and Milan Petkovic}, title = {Multi-layer Audit of Access Rights}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {18--32}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_2}, doi = {10.1007/978-3-540-75248-6\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Pfitzmann07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Rassadko07, author = {Nataliya Rassadko}, editor = {Willem Jonker and Milan Petkovic}, title = {Query Rewriting Algorithm Evaluation for {XML} Security Views}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {64--80}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_5}, doi = {10.1007/978-3-540-75248-6\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Rassadko07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/TrutaCM07, author = {Traian Marius Truta and Alina Campan and Paul Meyer}, editor = {Willem Jonker and Milan Petkovic}, title = {Generating Microdata with \emph{P} -Sensitive \emph{K} -Anonymity Property}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {124--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_9}, doi = {10.1007/978-3-540-75248-6\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/TrutaCM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WangWP07, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Willem Jonker and Milan Petkovic}, title = {Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {108--123}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_8}, doi = {10.1007/978-3-540-75248-6\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/WangWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2007, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6}, doi = {10.1007/978-3-540-75248-6}, isbn = {978-3-540-75247-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/AnJC06, author = {Xiangdong An and Dawn N. Jutla and Nick Cercone}, editor = {Willem Jonker and Milan Petkovic}, title = {Temporal Context Lie Detection and Generation}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {30--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_3}, doi = {10.1007/11844662\_3}, timestamp = {Mon, 03 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/AnJC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BottcherO06, author = {Stefan B{\"{o}}ttcher and Sebastian Obermeier}, editor = {Willem Jonker and Milan Petkovic}, title = {Sovereign Information Sharing Among Malicious Partners}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {18--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_2}, doi = {10.1007/11844662\_2}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BottcherO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BottcherS06, author = {Stefan B{\"{o}}ttcher and Rita Steinmetz}, editor = {Willem Jonker and Milan Petkovic}, title = {Information Disclosure by XPath Queries}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {160--174}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_12}, doi = {10.1007/11844662\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BottcherS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ByunP06, author = {Changwoo Byun and Seog Park}, editor = {Willem Jonker and Milan Petkovic}, title = {Two Phase Filtering for {XML} Access Control}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {115--130}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_9}, doi = {10.1007/11844662\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ByunP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ByunRPL06, author = {Jin Wook Byun and Hyun Suk Rhee and Hyun{-}A Park and Dong Hoon Lee}, editor = {Willem Jonker and Milan Petkovic}, title = {Off-Line Keyword Guessing Attacks on Recent Keyword Search Schemes over Encrypted Data}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {75--83}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_6}, doi = {10.1007/11844662\_6}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/ByunRPL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ByunSBL06, author = {Ji{-}Won Byun and Yonglak Sohn and Elisa Bertino and Ninghui Li}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Anonymization for Incremental Datasets}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {48--63}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_4}, doi = {10.1007/11844662\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ByunSBL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChinaeiZ06, author = {Amir H. Chinaei and Huaxin Zhang}, editor = {Willem Jonker and Milan Petkovic}, title = {Hybrid Authorizations and Conflict Resolution}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {131--145}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_10}, doi = {10.1007/11844662\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ChinaeiZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Hacigumus06, author = {Hakan Hacig{\"{u}}m{\"{u}}s}, editor = {Willem Jonker and Milan Petkovic}, title = {{SPIDER:} An Autonomic Computing Approach to Database Security Management}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {175--183}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_13}, doi = {10.1007/11844662\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Hacigumus06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Kuhn06, author = {Ulrich K{\"{u}}hn}, editor = {Willem Jonker and Milan Petkovic}, title = {Analysis of a Database and Index Encryption Scheme - Problems and Fixes}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {146--159}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_11}, doi = {10.1007/11844662\_11}, timestamp = {Mon, 05 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/Kuhn06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PrasadR06, author = {P. Krishna Prasad and C. Pandu Rangan}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy Preserving {BIRCH} Algorithm for Clustering over Vertically Partitioned Databases}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {84--99}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_7}, doi = {10.1007/11844662\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PrasadR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/RheeJBL06, author = {Hyun Sook Rhee and Ik Rae Jeong and Jin Wook Byun and Dong Hoon Lee}, editor = {Willem Jonker and Milan Petkovic}, title = {Difference Set Attacks on Conjunctive Keyword Search Schemes}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {64--74}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_5}, doi = {10.1007/11844662\_5}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/RheeJBL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SongO06, author = {Yunyu Song and Sylvia L. Osborn}, editor = {Willem Jonker and Milan Petkovic}, title = {Conflict of Interest in the Administrative Role Graph Model}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {100--114}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_8}, doi = {10.1007/11844662\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SongO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/YaoWWJ06, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Indistinguishability: The Other Aspect of Privacy}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {1--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_1}, doi = {10.1007/11844662\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2006, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662}, doi = {10.1007/11844662}, isbn = {978-3-540-38984-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ05, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Protecting Privacy Against Location-Based Personal Identification}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {185--199}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_13}, doi = {10.1007/11552338\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BottcherS05, author = {Stefan B{\"{o}}ttcher and Rita Steinmetz}, editor = {Willem Jonker and Milan Petkovic}, title = {Detecting Privacy Violations in Sensitive {XML} Databases}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {143--154}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_10}, doi = {10.1007/11552338\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BottcherS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanSDJ05, author = {Richard Brinkman and Berry Schoenmakers and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Experiments with Queries over Encrypted Data Using Secret Sharing}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {33--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_3}, doi = {10.1007/11552338\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanSDJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ChinaeiT05, author = {Amir H. Chinaei and Frank Wm. Tompa}, editor = {Willem Jonker and Milan Petkovic}, title = {User-Managed Access Control for Health Care Systems}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {63--72}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_5}, doi = {10.1007/11552338\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ChinaeiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DamianiVFJPS05, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Willem Jonker and Milan Petkovic}, title = {Metadata Management in Outsourced Encrypted Databases}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {16--32}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_2}, doi = {10.1007/11552338\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DamianiVFJPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DragovicP05, author = {Boris Dragovic and Calicrates Policroniades}, editor = {Willem Jonker and Milan Petkovic}, title = {Information SeeSaw: Availability vs. Security Management in the UbiComp World}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {200--216}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_14}, doi = {10.1007/11552338\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DragovicP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Gabillon05, author = {Alban Gabillon}, editor = {Willem Jonker and Milan Petkovic}, title = {A Formal Access Control Model for {XML} Databases}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {86--103}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_7}, doi = {10.1007/11552338\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Gabillon05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/HacigumusM05, author = {Hakan Hacig{\"{u}}m{\"{u}}s and Sharad Mehrotra}, editor = {Willem Jonker and Milan Petkovic}, title = {Efficient Key Updates in Encrypted Database Systems}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {1--15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_1}, doi = {10.1007/11552338\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/HacigumusM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/HintogluS05, author = {Ay{\c{c}}a Azgin Hintoglu and Y{\"{u}}cel Saygin}, editor = {Willem Jonker and Milan Petkovic}, title = {Suppressing Microdata to Prevent Probabilistic Classification Based Inference}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {155--169}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_11}, doi = {10.1007/11552338\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/HintogluS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/IonitaO05, author = {Cecilia Ionita and Sylvia L. Osborn}, editor = {Willem Jonker and Milan Petkovic}, title = {Specifying an Access Control Model for Ontologies for the Semantic Web}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {73--85}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_6}, doi = {10.1007/11552338\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/IonitaO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/NairGMM05, author = {Gopakumar Nair and Ajeesh Gopalakrishnan and Sjouke Mauw and Erik Moll}, editor = {Willem Jonker and Milan Petkovic}, title = {{XML} Security in the Next Generation Optical Disc Context}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {217--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_15}, doi = {10.1007/11552338\_15}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/NairGMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PowerSS05, author = {David J. Power and Mark Slaymaker and Andrew C. Simpson}, editor = {Willem Jonker and Milan Petkovic}, title = {On Deducibility and Anonymisation in Medical Databases}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {170--184}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_12}, doi = {10.1007/11552338\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PowerSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Ramesh05, author = {Ganesh Ramesh}, editor = {Willem Jonker and Milan Petkovic}, title = {Can Attackers Learn from Samples?}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {104--123}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_8}, doi = {10.1007/11552338\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Ramesh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/TolandFE05, author = {Tyrone S. Toland and Csilla Farkas and Caroline M. Eastman}, editor = {Willem Jonker and Milan Petkovic}, title = {Dynamic Disclosure Monitor (\emph{D}\({}^{\mbox{\emph{2}}}\)\emph{Mon}): An Improved Query Processing Solution}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {124--142}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_9}, doi = {10.1007/11552338\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/TolandFE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/WimmerK05, author = {Martin Wimmer and Alfons Kemper}, editor = {Willem Jonker and Milan Petkovic}, title = {An Authorization Framework for Sharing Data in Web Service Federations}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {47--62}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_4}, doi = {10.1007/11552338\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/WimmerK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Yuan05, author = {Yumin Yuan}, editor = {Willem Jonker and Milan Petkovic}, title = {Improvement of Hsu-Wu-He's Proxy Multi-signature Schemes}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {234--240}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_16}, doi = {10.1007/11552338\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Yuan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2005, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338}, doi = {10.1007/11552338}, isbn = {3-540-28798-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ04, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Identifying Sensitive Associations in Databases for Release Control}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {187--201}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_14}, doi = {10.1007/978-3-540-30073-1\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrinkmanDJ04, author = {Richard Brinkman and Jeroen Doumen and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Using Secret Sharing for Searching in Encrypted Data}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {18--27}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_2}, doi = {10.1007/978-3-540-30073-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrinkmanDJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ConradoPJ04, author = {Claudine Conrado and Milan Petkovic and Willem Jonker}, editor = {Willem Jonker and Milan Petkovic}, title = {Privacy-Preserving Digital Rights Management}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {83--99}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_7}, doi = {10.1007/978-3-540-30073-1\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ConradoPJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/EloviciWSG04, author = {Yuval Elovici and Ronen Waisenberg and Erez Shmueli and Ehud Gudes}, editor = {Willem Jonker and Milan Petkovic}, title = {A Structure Preserving Database Encryption Scheme}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {28--40}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_3}, doi = {10.1007/978-3-540-30073-1\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/EloviciWSG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JayapandianNMJ04, author = {Magesh Jayapandian and Brian D. Noble and James W. Mickens and H. V. Jagadish}, editor = {Willem Jonker and Milan Petkovic}, title = {Using Delay to Defend Against Database Extraction}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {202--218}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_15}, doi = {10.1007/978-3-540-30073-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JayapandianNMJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/JutlaBG04, author = {Dawn N. Jutla and Peter Bodorik and Deyun Gao}, editor = {Willem Jonker and Milan Petkovic}, title = {Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {100--117}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_8}, doi = {10.1007/978-3-540-30073-1\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/JutlaBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LinC04, author = {Ping Lin and K. Sel{\c{c}}uk Candan}, editor = {Willem Jonker and Milan Petkovic}, title = {Secure and Privacy Preserving Outsourcing of Tree Structured Data}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {1--17}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_1}, doi = {10.1007/978-3-540-30073-1\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/LinC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/LuoLLL04, author = {Bo Luo and Dongwon Lee and Wang{-}Chien Lee and Peng Liu}, editor = {Willem Jonker and Milan Petkovic}, title = {A Flexible Framework for Architecting {XML} Access Control Enforcement Mechanisms}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {133--147}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_10}, doi = {10.1007/978-3-540-30073-1\_10}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/LuoLLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/MiklauS04, author = {Gerome Miklau and Dan Suciu}, editor = {Willem Jonker and Milan Petkovic}, title = {Modeling Integrity in Data Exchange}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {41--54}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_4}, doi = {10.1007/978-3-540-30073-1\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/MiklauS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/NejdlOW04, author = {Wolfgang Nejdl and Daniel Olmedilla and Marianne Winslett}, editor = {Willem Jonker and Milan Petkovic}, title = {PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {118--132}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_9}, doi = {10.1007/978-3-540-30073-1\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/NejdlOW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/OliveiraZ04, author = {Stanley R. M. Oliveira and Osmar R. Za{\"{\i}}ane}, editor = {Willem Jonker and Milan Petkovic}, title = {Achieving Privacy Preservation when Sharing Data for Clustering}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {67--82}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_6}, doi = {10.1007/978-3-540-30073-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/OliveiraZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/RosenthalS04, author = {Arnon Rosenthal and Edward Sciore}, editor = {Willem Jonker and Milan Petkovic}, title = {Abstracting and Refining Authorization in {SQL}}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {148--162}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_11}, doi = {10.1007/978-3-540-30073-1\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/RosenthalS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ShengO04, author = {Shengli Sheng and Sylvia L. Osborn}, editor = {Willem Jonker and Milan Petkovic}, title = {A Classifier-Based Approach to User-Role Assignment for Web Applications}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {163--171}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_12}, doi = {10.1007/978-3-540-30073-1\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ShengO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/SubramaniamWY04, author = {Hiranmayee Subramaniam and Rebecca N. Wright and Zhiqiang Yang}, editor = {Willem Jonker and Milan Petkovic}, title = {Experimental Analysis of Privacy-Preserving Statistics Computation}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {55--66}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_5}, doi = {10.1007/978-3-540-30073-1\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/SubramaniamWY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/YuL04, author = {Hai Yu and Ee{-}Peng Lim}, editor = {Willem Jonker and Milan Petkovic}, title = {{LTAM:} {A} Location-Temporal Authorization Model}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {172--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_13}, doi = {10.1007/978-3-540-30073-1\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/YuL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sdmw/2004, editor = {Willem Jonker and Milan Petkovic}, title = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b99822}, doi = {10.1007/B99822}, isbn = {3-540-22983-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.