Secure data management: 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5776 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 171 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 364204218X 9783642042188 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035724637 | ||
003 | DE-604 | ||
005 | 20101022 | ||
007 | t| | ||
008 | 090915s2009 xx d||| |||| 10||| eng d | ||
015 | |a 09N340056 |2 dnb | ||
016 | 7 | |a 995796203 |2 DE-101 | |
020 | |a 364204218X |c PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 3-642-04218-X | ||
020 | |a 9783642042188 |c PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.) |9 978-3-642-04218-8 | ||
035 | |a (OCoLC)436029042 | ||
035 | |a (DE-599)DNB995796203 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-706 |a DE-11 |a DE-83 | ||
050 | 0 | |a QA76.9.D314 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.74 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 650f |2 stub | ||
245 | 1 | 0 | |a Secure data management |b 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings |c Willem Jonker ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a VIII, 171 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5776 | |
650 | 4 | |a Datenbanksystem - Datensicherung - Kongress - Lyon <2009> | |
650 | 4 | |a Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009> | |
650 | 4 | |a Trusted Computing - Kongress - Lyon <2009> | |
650 | 4 | |a Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Database management |v Congresses | |
650 | 0 | 7 | |a Sensorsystem |0 (DE-588)4307964-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverwaltung |0 (DE-588)4011168-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymisierung |0 (DE-588)4139362-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Vertrauenswürdigkeit |0 (DE-588)4209886-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Abfrageverarbeitung |0 (DE-588)4378490-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Lyon |2 gnd-content | |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 1 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Datenverwaltung |0 (DE-588)4011168-4 |D s |
689 | 2 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 2 | 2 | |a Vertrauenswürdigkeit |0 (DE-588)4209886-5 |D s |
689 | 2 | 3 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | 5 | |a Sensorsystem |0 (DE-588)4307964-7 |D s |
689 | 2 | 6 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 2 | 7 | |a Datenbanksystem |0 (DE-588)4113276-2 |D s |
689 | 2 | 8 | |a Abfrageverarbeitung |0 (DE-588)4378490-2 |D s |
689 | 2 | |8 1\p |5 DE-604 | |
689 | 3 | 0 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 3 | 1 | |a Anonymisierung |0 (DE-588)4139362-4 |D s |
689 | 3 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 3 | 3 | |a Vertrauenswürdigkeit |0 (DE-588)4209886-5 |D s |
689 | 3 | 4 | |a Datenverwaltung |0 (DE-588)4011168-4 |D s |
689 | 3 | |8 2\p |5 DE-604 | |
689 | 4 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 4 | |8 3\p |5 DE-604 | |
689 | 5 | 0 | |a Geheimnisprinzip |0 (DE-588)4437501-3 |D s |
689 | 5 | |8 4\p |5 DE-604 | |
700 | 1 | |a Jonker, Willem |d 1962- |e Sonstige |0 (DE-588)122052544 |4 oth | |
711 | 2 | |a SDM |n 6 |d 2009 |c Lyon |j Sonstige |0 (DE-588)16021498-1 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5776 |w (DE-604)BV000000607 |9 5776 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018001350 |
Datensatz im Suchindex
_version_ | 1820875171854024704 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
DATABASE SECURITY QUERY OPTIMIZATION IN ENCRYPTED RELATIONAL DATABASES
BY VERTICAL SCHEMA PARTITIONING 1
MUSTAFA CANIM, MURAT KANTARCIOGLU, AND AH INAN
DO YOU KNOW WHERE YOUR DATA'S BEEN? - TAMPER-EVIDENT DATABASE PROVENANCE
17
JING ZHANG, ADRIANE CHAPMAN, AND KRISTEN LEFEVRE DATABASE INTRUSION
DETECTION USING ROLE PROFILING WITH ROLE HIERARCHY 33
GARFIELD ZHIPING WU, SYLVIA L. OSBORN, AND XIN JIN
QUERY PROCESSING TECHNIQUES FOR COMPLIANCE WITH DATA CONFIDENCE POLICIES
49
CHENYUN DAI, DAN LIN. MURAT KANTARCIOGLU. ELISA BERTINO, EBRU CELIKEL,
AND BHAVANI THURAISINGHAM
ACCESS CONTROL AN ACCESS CONTROL LANGUAGE FOR A GENERAL PROVENANCE MODEL
68 QUN NI, SHOUHUAI XU. ELISA BERTINO. RAVI SANDHU, AND WEILI HAN
A FLEXIBLE ACCESS CONTROL MODEL FOR DISTRIBUTED COLLABORATIVE EDITORS 89
ABDESSAMAD MINE, ASMA CHERIF, AND MICHAEL RUSINOWITCH
ON THE CONSTRUCTION AND VERIFICATION OF SELF-MODIFYING ACCESS CONTROL
POLICIES 107
DAVID POWER. MARK SLAYMAKER, AND ANDREW SIMPSON
CONTROLLING ACCESS TO XML DOCUMENTS OVER XML NATIVE AND RELATIONAL
DATABASES 122
LAZAROS KOROMILAS. GEORGE CHINIS, IRINI FUNDULAKI, AND SOTIRIS IOANNIDIS
PRIVACY PROTECTION
LONGITUDE: CENTRALIZED PRIVACY-PRESERVING COMPUTATION OF USERS"
PROXIMITY 142
SERGIO MASCETTI, CLAUDIO BETTINI, AND DARIO FRENI L-COVER: PRESERVING
DIVERSITY BY ANONYMITY 158
LEI ZHANG, LINGYU WANG. SUSHIL JAJODIA. AND ALEXANDER BRODSKY
AUTHOR INDEX 173
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/995796203
DIGITALISIERT DURCH |
any_adam_object | 1 |
author_GND | (DE-588)122052544 |
building | Verbundindex |
bvnumber | BV035724637 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.D314 |
callnumber-search | QA76.9.D314 |
callnumber-sort | QA 276.9 D314 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 650f |
ctrlnum | (OCoLC)436029042 (DE-599)DNB995796203 |
dewey-full | 005.8 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 005.74 |
dewey-search | 005.8 005.74 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035724637</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20101022</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090915s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09N340056</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">995796203</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">364204218X</subfield><subfield code="c">PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">3-642-04218-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642042188</subfield><subfield code="c">PB. : EUR 49.22 (freier Pr.), sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-04218-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436029042</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB995796203</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.D314</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 650f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure data management</subfield><subfield code="b">6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings</subfield><subfield code="c">Willem Jonker ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 171 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5776</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenbanksystem - Datensicherung - Kongress - Lyon <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Trusted Computing - Kongress - Lyon <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Database management</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sensorsystem</subfield><subfield code="0">(DE-588)4307964-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Vertrauenswürdigkeit</subfield><subfield code="0">(DE-588)4209886-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abfrageverarbeitung</subfield><subfield code="0">(DE-588)4378490-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Lyon</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Vertrauenswürdigkeit</subfield><subfield code="0">(DE-588)4209886-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="3"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="5"><subfield code="a">Sensorsystem</subfield><subfield code="0">(DE-588)4307964-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="6"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="7"><subfield code="a">Datenbanksystem</subfield><subfield code="0">(DE-588)4113276-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="8"><subfield code="a">Abfrageverarbeitung</subfield><subfield code="0">(DE-588)4378490-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Anonymisierung</subfield><subfield code="0">(DE-588)4139362-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="3"><subfield code="a">Vertrauenswürdigkeit</subfield><subfield code="0">(DE-588)4209886-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="4"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Geheimnisprinzip</subfield><subfield code="0">(DE-588)4437501-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jonker, Willem</subfield><subfield code="d">1962-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122052544</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">SDM</subfield><subfield code="n">6</subfield><subfield code="d">2009</subfield><subfield code="c">Lyon</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16021498-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5776</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5776</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018001350</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Lyon gnd-content |
genre_facet | Konferenzschrift 2009 Lyon |
id | DE-604.BV035724637 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:23Z |
institution | BVB |
institution_GND | (DE-588)16021498-1 |
isbn | 364204218X 9783642042188 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018001350 |
oclc_num | 436029042 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
physical | VIII, 171 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings Willem Jonker ... (eds.) Berlin [u.a.] Springer 2009 VIII, 171 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5776 Datenbanksystem - Datensicherung - Kongress - Lyon <2009> Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009> Trusted Computing - Kongress - Lyon <2009> Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009> Computer security Congresses Database management Congresses Sensorsystem (DE-588)4307964-7 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Datenbanksystem (DE-588)4113276-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenverwaltung (DE-588)4011168-4 gnd rswk-swf Anonymisierung (DE-588)4139362-4 gnd rswk-swf Vertrauenswürdigkeit (DE-588)4209886-5 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Cloud Computing (DE-588)7623494-0 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Geheimnisprinzip (DE-588)4437501-3 gnd rswk-swf Abfrageverarbeitung (DE-588)4378490-2 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Lyon gnd-content Zugriffskontrolle (DE-588)4293034-0 s Authentifikation (DE-588)4330656-1 s DE-604 Trusted Computing (DE-588)7562931-8 s Datenverwaltung (DE-588)4011168-4 s Privatsphäre (DE-588)4123980-5 s Vertrauenswürdigkeit (DE-588)4209886-5 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s Sensorsystem (DE-588)4307964-7 s Cloud Computing (DE-588)7623494-0 s Datenbanksystem (DE-588)4113276-2 s Abfrageverarbeitung (DE-588)4378490-2 s 1\p DE-604 Anonymisierung (DE-588)4139362-4 s 2\p DE-604 Kryptosystem (DE-588)4209132-9 s 3\p DE-604 Geheimnisprinzip (DE-588)4437501-3 s 4\p DE-604 Jonker, Willem 1962- Sonstige (DE-588)122052544 oth SDM 6 2009 Lyon Sonstige (DE-588)16021498-1 oth Lecture notes in computer science 5776 (DE-604)BV000000607 5776 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 4\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings Lecture notes in computer science Datenbanksystem - Datensicherung - Kongress - Lyon <2009> Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009> Trusted Computing - Kongress - Lyon <2009> Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009> Computer security Congresses Database management Congresses Sensorsystem (DE-588)4307964-7 gnd Kryptosystem (DE-588)4209132-9 gnd Datenbanksystem (DE-588)4113276-2 gnd Computersicherheit (DE-588)4274324-2 gnd Datenverwaltung (DE-588)4011168-4 gnd Anonymisierung (DE-588)4139362-4 gnd Vertrauenswürdigkeit (DE-588)4209886-5 gnd Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Abfrageverarbeitung (DE-588)4378490-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4307964-7 (DE-588)4209132-9 (DE-588)4113276-2 (DE-588)4274324-2 (DE-588)4011168-4 (DE-588)4139362-4 (DE-588)4209886-5 (DE-588)4011144-1 (DE-588)7623494-0 (DE-588)4293034-0 (DE-588)4330656-1 (DE-588)4123980-5 (DE-588)4437501-3 (DE-588)4378490-2 (DE-588)7562931-8 (DE-588)1071861417 |
title | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings |
title_auth | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings |
title_exact_search | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings |
title_full | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings Willem Jonker ... (eds.) |
title_fullStr | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings Willem Jonker ... (eds.) |
title_full_unstemmed | Secure data management 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings Willem Jonker ... (eds.) |
title_short | Secure data management |
title_sort | secure data management 6th vldb workshop sdm 2009 lyon france august 28 2009 proceedings |
title_sub | 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009 ; proceedings |
topic | Datenbanksystem - Datensicherung - Kongress - Lyon <2009> Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009> Trusted Computing - Kongress - Lyon <2009> Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009> Computer security Congresses Database management Congresses Sensorsystem (DE-588)4307964-7 gnd Kryptosystem (DE-588)4209132-9 gnd Datenbanksystem (DE-588)4113276-2 gnd Computersicherheit (DE-588)4274324-2 gnd Datenverwaltung (DE-588)4011168-4 gnd Anonymisierung (DE-588)4139362-4 gnd Vertrauenswürdigkeit (DE-588)4209886-5 gnd Datensicherung (DE-588)4011144-1 gnd Cloud Computing (DE-588)7623494-0 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Authentifikation (DE-588)4330656-1 gnd Privatsphäre (DE-588)4123980-5 gnd Geheimnisprinzip (DE-588)4437501-3 gnd Abfrageverarbeitung (DE-588)4378490-2 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Datenbanksystem - Datensicherung - Kongress - Lyon <2009> Datenverwaltung - Privatsphäre - Datensicherung - Kongress - Lyon <2009> Trusted Computing - Kongress - Lyon <2009> Zugriffskontrolle - Authentifikation - Kongress - Lyon <2009> Computer security Congresses Database management Congresses Sensorsystem Kryptosystem Datenbanksystem Computersicherheit Datenverwaltung Anonymisierung Vertrauenswürdigkeit Datensicherung Cloud Computing Zugriffskontrolle Authentifikation Privatsphäre Geheimnisprinzip Abfrageverarbeitung Trusted Computing Konferenzschrift 2009 Lyon |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018001350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT jonkerwillem securedatamanagement6thvldbworkshopsdm2009lyonfranceaugust282009proceedings AT sdmlyon securedatamanagement6thvldbworkshopsdm2009lyonfranceaugust282009proceedings |