Concepts like ubiquitous computing and ambient intelligence that exploit increasingly
interconnected networks and mobility put new requirements on data
management. An important element in the connected world is that data will
be accessible anytime anywhere. This also has its downside in that it becomes
easier to get unauthorized data access. Furthermore, it will become easier to
collect, store, and search personal information and endanger people’s privacy.
As a result security and privacy of data becomes more and more of an issue.
Therefore, secure data management, which is also privacy-enhanced, turns out
to be a challenging goal that will also seriously influence the acceptance of ubiquitous
computing and ambient intelligence concepts by society.
With the above in mind, we organized the SDM 2004 workshop to initiate and
promote secure data management as one of the important interdisciplinary research
fields that brings together people from the security research community
and the data management research community. The call for papers attracted
28 submissions both from universities and industry. The program committee
selected 15 research papers for presentation at the workshop. The technical contributions
presented at the SDM workshop are collected in this volume, which,
we hope, will serve as a valuable research and reference book in your professional
life.
The volume is divided into four topical parts. The first section focuses on accessing
encrypted data. The first three papers of this section concentrate on the
interesting problem of searching in encrypted data, while the last paper discusses
the integrity of data that is shared or exchanged on the World-Wide Web. The
second section addresses private data management, as well as management of
private (personal) data. Research topics of this section include management of
personal data with P3P for Internet services, privacy in digital rights management,
as well as privacy-preserving data mining. The third section focuses on
access control, which remains an important area of interest for database security
researchers. Finally, two papers in the fourth section discuss specific topics within
database security: release control of sensitive associations stored in databases,
and a method to defend against copying a database as a whole.