Secure Data Management Third VLDB Workshop, SDM 2006, Seoul, Korea,
Recent developments in computer, communication, and information techno- gies, along with increasingly interconnected networks and mobility have est- lished new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very importa
- PDF / 2,169,102 Bytes
- 193 Pages / 430 x 660 pts Page_size
- 64 Downloads / 169 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4165
Willem Jonker Milan Petkovi´c (Eds.)
Secure Data Management Third VLDB Workshop, SDM 2006 Seoul, Korea, September 10-11, 2006 Proceedings
13
Volume Editors Willem Jonker Philips Research Europe High Tech Campus 34 5656 AE Eindhoven The Netherlands E-mail: [email protected] Milan Petkovi´c Philips Research Laboratories High Tech Campus 34 5656 AE Eindhoven The Netherlands E-mail: [email protected]
Library of Congress Control Number: 2006931629 CR Subject Classification (1998): H.2.0, H.2, C.2.0, H.3, E.3, D.4.6, K.6.5 LNCS Sublibrary: SL 3 – Information Systems and Application, incl. Internet/Web and HCI ISSN ISBN-10 ISBN-13
0302-9743 3-540-38984-9 Springer Berlin Heidelberg New York 978-3-540-38984-2 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2006 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 11844662 06/3142 543210
Preface
Recent developments in computer, communication, and information technologies, along with increasingly interconnected networks and mobility have established new emerging technologies, such as ubiquitous computing and ambient intelligence, as a very important and unavoidable part of everyday life. However, this development has greatly influenced people’s security concerns. As data is accessible anytime from anywhere, according to these new concepts, it becomes much easier to get unauthorized data access. As another consequence, the use of new technologies has brought some
Data Loading...