The new emerging technologies put new requirements on security and data management.
As data are accessible anytime anywhere, it becomes much easier to get
unauthorized data access. Furthermore, the use of new technologies has brought
some privacy concerns. It becomes simpler to collect, store, and search personal
information thereby endangering people’s privacy. Therefore, research in secure
data management is gaining importance, attracting the attention of both the
data management and the security research communities. The interesting problems
range from traditional topics, such as, access control and general database
security, via privacy protection to new research directions, such as cryptographically
enforced access control and encrypted databases.
This year, the call for papers attracted 24 papers both from universities and
industry. For presentation at the workshop, the Program Committee selected 10
full papers (41% acceptance rate). These papers are collected in this volume,
which we hope will serve as a useful research and reference material.
The papers in the proceeding are grouped into three sections. The first section
focuses on database security which remains an important research area.
The papers in this section address several interesting topics including query
optimization in encrypted databases, database provenance, database intrusion
detection, and confidence policy compliant query evaluation. The second section
changes the focal point to the topic of access control. The papers in this section
deal with provenance access control, access control model for collaborative
editors, self-modifying access control policies, and enforcing access control on
XML documents. The third section focuses on privacy protection addressing the
privacy issues around location-based services and anonymity/diversity for the
micro-data release problem.
We wish to thank all the authors of submitted papers for their high-quality
submissions. We would also like to thank the Program Committee members
as well as additional referees for doing an excellent review job. Finally, let us
acknowledge Luan Ibraimi who helped in the technical preparation of the proceedings.
|Lecture notes in computer science
|SDM : secure data management : VLDB workshop