000 | 03506nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-19348-4 | ||
003 | DE-He213 | ||
005 | 20160624102155.0 | ||
007 | cr nn 008mamaa | ||
008 | 110211s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642193484 _9978-3-642-19348-4 |
||
024 | 7 |
_a10.1007/978-3-642-19348-4 _2doi |
|
050 | 4 | _aQA76.9.M3 | |
072 | 7 |
_aUYZM _2bicssc |
|
072 | 7 |
_aUKR _2bicssc |
|
072 | 7 |
_aBUS083000 _2bisacsh |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.74 _223 |
245 | 1 | 0 |
_aData Privacy Management and Autonomous Spontaneous Security _h[electronic resource] : _b5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre. |
260 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_aXIV, 259 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6514 |
|
520 | _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aInformation systems. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aInformation Systems Applications (incl.Internet). |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. |
|
700 | 1 |
_aCavalli, Ana. _eeditor. |
|
700 | 1 |
_aLeneutre, Jean. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642193477 |
786 | _dSpringer | ||
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6514 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-19348-4 |
942 |
_2EBK9531 _cEBK |
||
999 |
_c38825 _d38825 |