000 | 03718nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-28879-1 | ||
003 | DE-He213 | ||
005 | 20240423130212.0 | ||
007 | cr nn 008mamaa | ||
008 | 120312s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642288791 _9978-3-642-28879-1 |
||
024 | 7 |
_a10.1007/978-3-642-28879-1 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aKJQ _2bicssc |
|
072 | 7 |
_aCOM039000 _2bisacsh |
|
072 | 7 |
_aKJQ _2thema |
|
082 | 0 | 4 |
_a004.068 _223 |
245 | 1 | 0 |
_aData Privacy Management and Autonomous Spontaneus Security _h[electronic resource] : _b6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXV, 319 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7122 |
|
520 | _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration. | ||
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputers and civilization. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aApplication software. | |
650 | 1 | 4 | _aIT Operations. |
650 | 2 | 4 | _aCryptology. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aCuppens-Boulahia, Nora. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aDe Capitani di Vimercati, Sabrina. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642288784 |
776 | 0 | 8 |
_iPrinted edition: _z9783642288807 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7122 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-28879-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c186147 _d186147 |