TY - BOOK ID - 36762295 TI - Secure Data Management : 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings AU - Jonker, Willem. AU - Petković, Milan. PY - 2014 SN - 3319068105 3319068113 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Cloud computing. KW - Computer security. KW - Database management. KW - Computer science. KW - Data encryption (Computer science). KW - Systems and Data Security. KW - Database Management. KW - Computers and Society. KW - Information Systems Applications (incl. Internet). KW - Cryptology. KW - Informatics KW - Science KW - Data base management KW - Data services (Database management) KW - Database management services KW - DBMS (Computer science) KW - Generalized data management systems KW - Services, Database management KW - Systems, Database management KW - Systems, Generalized database management KW - Electronic data processing KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Data encoding (Computer science) KW - Encryption of data (Computer science) KW - Computer security KW - Cryptography KW - Protection KW - Security measures KW - Computers and civilization. KW - Application software. KW - Application computer programs KW - Application computer software KW - Applications software KW - Apps (Computer software) KW - Computer software KW - Civilization and computers KW - Civilization UR - https://www.unicat.be/uniCat?func=search&query=sysid:36762295 AB - This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions. ER -