000 03891nam a22006495i 4500
001 978-3-642-19348-4
003 DE-He213
005 20240730175058.0
007 cr nn 008mamaa
008 110211s2011 gw | s |||| 0|eng d
020 _a9783642193484
_9978-3-642-19348-4
024 7 _a10.1007/978-3-642-19348-4
_2doi
050 4 _aQA76.9.M3
072 7 _aKJQ
_2bicssc
072 7 _aCOM039000
_2bisacsh
072 7 _aKJQ
_2thema
082 0 4 _a004.068
_223
245 1 0 _aData Privacy Management and Autonomous Spontaneous Security
_h[electronic resource] :
_b5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers /
_cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre.
250 _a1st ed. 2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2011.
300 _aXIV, 259 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6514
520 _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
650 0 _aElectronic data processing
_xManagement.
_9115326
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputers and civilization.
_921733
650 0 _aComputer networks .
_931572
650 0 _aOperating systems (Computers).
_95329
650 0 _aApplication software.
_9115327
650 1 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
650 2 4 _aComputers and Society.
_931668
650 2 4 _aComputer Communication Networks.
_9115328
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer and Information Systems Applications.
_9115329
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115330
700 1 _aNavarro-Arribas, Guillermo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115331
700 1 _aCavalli, Ana.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115332
700 1 _aLeneutre, Jean.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9115333
710 2 _aSpringerLink (Online service)
_9115334
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642193477
776 0 8 _iPrinted edition:
_z9783642193491
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6514
_9115335
856 4 0 _uhttps://doi.org/10.1007/978-3-642-19348-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89770
_d89770