Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /

Data Privacy Management and Security Assurance 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / [electronic resource] : edited by Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri. - 1st ed. 2016. - XIV, 247 p. 74 illus. online resource. - Security and Cryptology, 9963 2946-1863 ; . - Security and Cryptology, 9963 .

Management of privacy-sensitive informations -- Translation of high-level business goals into system-level privacy policies -- Administration of sensitive identifiers -- Data integration and privacy engineering.-Service oriented architectures -- Aspects of dependability, privacy, risk and trust. .

This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. .

9783319470726

10.1007/978-3-319-47072-6 doi


Data protection.
Electronic data processing--Management.
Cryptography.
Data encryption (Computer science).
Application software.
Algorithms.
Data and Information Security.
IT Operations.
Cryptology.
Computer and Information Systems Applications.
Algorithms.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in