000705065 000__ 02706cam\a2200553Ki\4500 000705065 001__ 705065 000705065 005__ 20230306135906.0 000705065 006__ m\\\\\o\\d\\\\\\\\ 000705065 007__ cr\un\nnnunnun 000705065 008__ 140604s2014\\\\sz\a\\\\o\\\\\101\0\eng\d 000705065 019__ $$a880841189 000705065 020__ $$a9783319068114$$qelectronic book 000705065 020__ $$a3319068113$$qelectronic book 000705065 020__ $$z9783319068107 000705065 0247_ $$a10.1007/978-3-319-06811-4$$2doi 000705065 0291_ $$aNLGGC$$b37586489X 000705065 035__ $$aSP(OCoLC)ocn880937600 000705065 035__ $$aSP(OCoLC)880937600$$z(OCoLC)880841189 000705065 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dNLGGC$$dOCLCO$$dYDXCP$$dCOO 000705065 049__ $$aISEA 000705065 050_4 $$aQA76.9.D314$$bS36 2013 000705065 08204 $$a005.74$$223 000705065 1112_ $$aSDM (Workshop)$$n(10th :$$d2013 :$$cTrento, Italy) 000705065 24510 $$aSecure data management$$h[electronic resource] :$$b10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings /$$cedited by Willem Jonker, Milan Petković. 000705065 2463_ $$aSDM 2013 000705065 264_1 $$aCham :$$bSpringer,$$c2014. 000705065 300__ $$a1 online resource (x, 139 pages) :$$billustrations. 000705065 336__ $$atext$$btxt$$2rdacontent 000705065 337__ $$acomputer$$bc$$2rdamedia 000705065 338__ $$aonline resource$$bcr$$2rdacarrier 000705065 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v8425 000705065 4901_ $$aLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web and HCI 000705065 500__ $$aInternational conference proceedings. 000705065 500__ $$aIncludes author index. 000705065 506__ $$aAccess limited to authorized users. 000705065 520__ $$aThis book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions. 000705065 588__ $$aDescription based on online resource; title from PDF title page (SpringerLink, viewed June 4, 2014). 000705065 650_0 $$aDatabase security$$vCongresses. 000705065 650_0 $$aData protection$$vCongresses. 000705065 650_0 $$aDatabase management$$vCongresses. 000705065 650_0 $$aData encryption (Computer science)$$vCongresses. 000705065 7001_ $$aJonker, Willem,$$d1962-$$eeditor. 000705065 7001_ $$aPetković, Milan,$$eeditor. 000705065 830_0 $$aLecture notes in computer science ;$$v8425. 000705065 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000705065 85280 $$bebk$$hSpringerLink 000705065 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-06811-4$$zOnline Access 000705065 909CO $$ooai:library.usi.edu:705065$$pGLOBAL_SET 000705065 980__ $$aEBOOK 000705065 980__ $$aBIB 000705065 982__ $$aEbook 000705065 983__ $$aOnline 000705065 994__ $$a92$$bISE