Secure Data Management
10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings
Book and Conference Proceedings
Chapter and Conference Paper
This paper reflects on security, privacy and trust from the point of you of the innovation in information and communication technologies. It also considers social, economic and legal aspects that need to be ta...
Chapter and Conference Paper
Advances in DNA sequencing create new opportunities for the use of DNA data in healthcare for diagnostic and treatment purposes, but also in many other health and well-being services. This brings new challenge...
Chapter and Conference Paper
The need for privacy protection on the Internet is well recognized. Everyday users are asked to release personal information in order to use online services and applications. Service providers do not always ne...
Book and Conference Proceedings
Chapter and Conference Paper
To address today’s major concerns of health service providers regarding security, resilience and data protection when moving on the cloud, we propose an approach to build a trustworthy healthcare platform clou...
Book and Conference Proceedings
8th VLDB Workshop, SDM 2011, Seattle, WA, USA, September 2, 2011, Proceedings
Chapter and Conference Paper
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of a...
Chapter and Conference Paper
Data protection legislation requires personal data to be collected and processed only for lawful and legitimate purposes. Unfortunately, existing protection mechanisms are not appropriate for purpose control: ...
Book and Conference Proceedings
Book and Conference Proceedings
Book and Conference Proceedings
5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
Book and Conference Proceedings
4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007. Proceedings
Chapter and Conference Paper
The Broadcast Encryption methods, often referred to as revocation schemes, allow data to be efficiently broadcast to a dynamically changing group of users. A special case is when the receivers are stateless [2...
Book and Conference Proceedings
Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006. Proceedings
Chapter and Conference Paper
Current Digital Rights Management (DRM) systems lack a functionality that allows a user to have more control over his content licenses to preserve his privacy or otherwise protect his interests. This paper pre...
Book and Conference Proceedings
Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005. Proceedings
Book and Conference Proceedings
Chapter and Conference Paper
DRM systems provide a means for protecting digital content, but at the same time they violate the privacy of users in a number of ways. This paper addresses privacy issues in DRM systems. The main challenge is...