Secure data management : 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007 : proceedings
This book constitutes the refereed proceedings of the Fourth VLDB 2007 International Workshop on Secure Data Management, SDM 2007, held in Vienna, Austria, September 23-24, 2007 in conjunction with VLDB 2007. The 11 revised full papers presented were carefully reviewed and selected from 29 submissio...
Saved in:
| Main Authors | , , , |
|---|---|
| Format | eBook Book |
| Language | English |
| Published |
Berlin
Springer
2007
Springer Berlin / Heidelberg |
| Edition | 1 |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783540752479 3540752471 |
Cover
Table of Contents:
- Intro -- Preface -- Organization -- Table of Contents -- A Unified Conflict Resolution Algorithm -- Multi-layer Audit of Access Rights -- Refinement for Administrative Policies -- Authenticating kNN Query Results in Data Publishing -- Query Rewriting Algorithm Evaluation for XML Security Views -- Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases -- Architecture for Data Collection in Database Intrusion Detection Systems -- Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data -- Generating Microdata with P-Sensitive K-Anonymity Property -- Preventing Privacy-Invasive Software Using Collaborative Reputation Systems -- Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement -- Requirements of Secure Storage Systems for Healthcare Records -- An Intrusion Detection System for Detecting Phishing Attacks -- A Three-Dimensional Conceptual Framework for Database Privacy -- Novel RFID Authentication Schemes for Security Enhancement and System Efficiency -- Author Index
- Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases -- Introduction -- Function Based Security Requirement & -- Data Availability -- A Function-Based Security Requirement -- A Function-Based Data Availability Measure -- Providing Maximum Data Availability for Independent Cases -- One-Dimensional Case -- Special Cases Near the Borders -- Pre-Disclosure Algorithm for Different Original Distribution -- Independent Multi-dimensional Case -- Dependent Multi-dimensional Case -- Related Work and Conclusions -- References -- Architecture for Data Collection in Database Intrusion Detection Systems -- Introduction -- Database Intrusion Detection -- Intrusion Detection and Types of IDSs -- Database IDSs -- Related Work -- Data Collection Methods for Generic IDSs -- Existing Database IDSs and Their Data Collection Methods -- Advantages and Disadvantages of Built-in DBMS Auditing -- Advantages -- Disadvantages -- Proposed Approach to Data Collection in Database IDS -- Architecture -- Initial Implementation -- Advantages -- Discussion -- Conclusion and Future Work -- References -- Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data -- Introduction -- Preliminaries -- Model -- Privacy -- Security Models -- Complexity Assumptions -- Overview of Techniques -- RSA-Based Accumulators -- Paillier's Cryptosystem -- Blind Signatures -- Constructing CSI-CKR -- SystemSetup - System Instantiation Process -- AuthCodGen - Group Authentication Process -- DataGen - Data Build Process -- DataQuery - Data Search and Download Process -- DataDcrypt - Data Decryption Process -- Correctness -- Correctness of Authentication -- Correctness of Search -- Security -- ComparisonwithParket al's Schemes -- Conclusion and Open Problem -- References -- Generating Microdata with P-Sensitive K-Anonymity Property -- Introduction
- Intro -- Title Page -- Preface -- Organization -- Table of Contents -- A Unified Conflict Resolution Algorithm -- Introduction -- Motivating Example -- Outline -- Conflict Resolution Models -- Conflict Resolution Policies -- Combined Strategies -- Implementation -- Algorithm Resolve() -- Function Propagate() -- Computational Analysis -- Experiments -- Related Work -- Conclusions -- References -- Multi-layer Audit of Access Rights -- Introduction -- Related Work -- Model of Multi-layer Access Control -- Basic Static Model: Data-and-Policy Tree -- Extensions of the Static Model -- Dynamic Model for Queries About the Past -- Dynamic Model for Queries About the Future -- Algorithms for the Static Case -- Algorithms for Queries About the Past -- Queries About Actual Past Accesses -- Queries About Potential Past Accesses -- Algorithms for Future Queries -- Constructing a Data-and-Policy Tree -- Conclusion -- References -- Refinement for Administrative Policies -- Introduction -- Preliminaries -- Administrative RBAC Policies -- Administrative Refinement -- Ordering Administrative Privileges -- Tractability -- Related Work -- Conclusion -- References -- Authenticating kNN Query Results in Data Publishing -- Introduction -- The Big Picture -- Problem Definition -- Background -- The Basic Solution -- kNN Authentication in Native Space -- kNN Authentication in Metric Space -- Performance Study -- Effect of Number of Dimensions -- Effect of Different Dataset Size -- Effect of Different Data Distributions -- I/O Access Cost -- Conclusion -- References -- Query Rewriting Algorithm Evaluation for XML Security Views -- Introduction -- Background -- Query Rewriting Algorithm Description -- Experimental Results -- Related Work -- Runtime Policy Evaluation -- Security Views for XML -- Schema-Based Security Views -- Conclusion -- References
- Privacy Models -- p-Sensitive k-Anonymity Model -- p-Sensitive k-Anonymity Model Properties -- Extended p-Sensitive k-Anonymity Model -- Privacy Algorithms -- Problem Description -- The EnhancedPKClustering Algorithm -- Preliminary Results -- Conclusions and Future Work -- References -- Preventing Privacy-Invasive Software Using Collaborative Reputation Systems -- Introduction -- Background and Related Work -- Important Considerations -- Addressing Incorrect Information -- Protecting Users' Privacy -- System Design -- Client Design -- Server Design -- Database Design -- Discussion -- System Impact -- Improvement Suggestions -- Comparison with Existing Countermeasures -- Conclusions and Future Work -- References -- Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement -- Introduction -- Background -- Formal Model -- Core Constructs -- Policy Coverage -- Illustrative Example -- PRIMA: The System -- Privacy Policy Definition -- Audit Management -- Policy Refinement -- Use Case Scenario -- Conclusion -- References -- Requirements of Secure Storage Systems for Healthcare Records -- Introduction -- Health Care Regulations -- HIPAA -- Occupational Safety and Health Administration Regulation -- EU Directives -- Requirements -- Limitations of Existing Storage Models -- Conclusion -- References -- An Intrusion Detection System for Detecting Phishing Attacks -- Introduction -- Phases of Phishing Attacks and Current Solutions -- Phases of Phishing -- Phishing Prevention -- Proposed Solution -- Phishing Recognition IDS -- Validating Phishing Sites -- Experimental Results -- Conclusions -- References -- A Three-Dimensional Conceptual Framework for Database Privacy -- Introduction -- Contribution and Plan of this Paper -- Independence of Respondent Privacy vs Owner Privacy -- Independence of Respondent Privacy and User Privacy
- Independence of Owner Privacy and User Privacy -- Tentative Technology Scoring -- Conclusions and Future Research -- References -- Novel RFID Authentication Schemes for Security Enhancement and System Efficiency -- Introduction -- Related Work -- Proposed Solution -- New Authentication Scheme -- Efficient Identity Match Scheme -- Security Analysis -- Conclusion -- References -- Author Index