000 | 03891nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-19348-4 | ||
003 | DE-He213 | ||
005 | 20240730175058.0 | ||
007 | cr nn 008mamaa | ||
008 | 110211s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642193484 _9978-3-642-19348-4 |
||
024 | 7 |
_a10.1007/978-3-642-19348-4 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aKJQ _2bicssc |
|
072 | 7 |
_aCOM039000 _2bisacsh |
|
072 | 7 |
_aKJQ _2thema |
|
082 | 0 | 4 |
_a004.068 _223 |
245 | 1 | 0 |
_aData Privacy Management and Autonomous Spontaneous Security _h[electronic resource] : _b5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXIV, 259 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6514 |
|
520 | _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc. | ||
650 | 0 |
_aElectronic data processing _xManagement. _9115326 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 0 |
_aApplication software. _9115327 |
|
650 | 1 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aComputer Communication Networks. _9115328 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9115329 |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115330 |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115331 |
|
700 | 1 |
_aCavalli, Ana. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115332 |
|
700 | 1 |
_aLeneutre, Jean. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9115333 |
|
710 | 2 |
_aSpringerLink (Online service) _9115334 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642193477 |
776 | 0 | 8 |
_iPrinted edition: _z9783642193491 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6514 _9115335 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-19348-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89770 _d89770 |