000 03758nam a22006495i 4500
001 978-3-642-19348-4
003 DE-He213
005 20240423125344.0
007 cr nn 008mamaa
008 110211s2011 gw | s |||| 0|eng d
020 _a9783642193484
_9978-3-642-19348-4
024 7 _a10.1007/978-3-642-19348-4
_2doi
050 4 _aQA76.9.M3
072 7 _aKJQ
_2bicssc
072 7 _aCOM039000
_2bisacsh
072 7 _aKJQ
_2thema
082 0 4 _a004.068
_223
245 1 0 _aData Privacy Management and Autonomous Spontaneous Security
_h[electronic resource] :
_b5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers /
_cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre.
250 _a1st ed. 2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2011.
300 _aXIV, 259 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6514
520 _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
650 0 _aElectronic data processing
_xManagement.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aComputers and civilization.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 0 _aApplication software.
650 1 4 _aIT Operations.
650 2 4 _aCryptology.
650 2 4 _aComputers and Society.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNavarro-Arribas, Guillermo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aCavalli, Ana.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLeneutre, Jean.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642193477
776 0 8 _iPrinted edition:
_z9783642193491
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6514
856 4 0 _uhttps://doi.org/10.1007/978-3-642-19348-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c177043
_d177043