Table of Contents:
  • Encrypted Data Access
  • Efficient Key Updates in Encrypted Database Systems
  • Metadata Management in Outsourced Encrypted Databases
  • Experiments with Queries over Encrypted Data Using Secret Sharing
  • Access Control
  • An Authorization Framework for Sharing Data in Web Service Federations
  • User-Managed Access Control for Health Care Systems
  • Specifying an Access Control Model for Ontologies for the Semantic Web
  • A Formal Access Control Model for XML Databases
  • Information Disclosure Control in Databases
  • Can Attackers Learn from Samples?
  • Dynamic Disclosure Monitor (D 2 Mon): An Improved Query Processing Solution
  • Detecting Privacy Violations in Sensitive XML Databases
  • Suppressing Microdata to Prevent Probabilistic Classification Based Inference
  • On Deducibility and Anonymisation in Medical Databases
  • Privacy and Security Support for Distributed Applications
  • Protecting Privacy Against Location-Based Personal Identification
  • Information SeeSaw: Availability vs. Security Management in the UbiComp World
  • XML Security in the Next Generation Optical Disc Context
  • Improvement of Hsu-Wu-He’s Proxy Multi-signature Schemes.