000 03506nam a22006135i 4500
001 978-3-642-19348-4
003 DE-He213
005 20160624102155.0
007 cr nn 008mamaa
008 110211s2011 gw | s |||| 0|eng d
020 _a9783642193484
_9978-3-642-19348-4
024 7 _a10.1007/978-3-642-19348-4
_2doi
050 4 _aQA76.9.M3
072 7 _aUYZM
_2bicssc
072 7 _aUKR
_2bicssc
072 7 _aBUS083000
_2bisacsh
072 7 _aCOM032000
_2bisacsh
082 0 4 _a005.74
_223
245 1 0 _aData Privacy Management and Autonomous Spontaneous Security
_h[electronic resource] :
_b5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers /
_cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2011.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2011.
300 _aXIV, 259 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6514
520 _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aOperating systems (Computers).
650 0 _aData encryption (Computer science).
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aData Encryption.
650 2 4 _aComputers and Society.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aInformation Systems Applications (incl.Internet).
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
700 1 _aNavarro-Arribas, Guillermo.
_eeditor.
700 1 _aCavalli, Ana.
_eeditor.
700 1 _aLeneutre, Jean.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642193477
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v6514
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-19348-4
942 _2EBK9531
_cEBK
999 _c38825
_d38825