Data Privacy Management and Autonomous Spontaneous Security 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers /

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Garcia-Alfaro, Joaquin (Επιμελητής έκδοσης), Navarro-Arribas, Guillermo (Επιμελητής έκδοσης), Cavalli, Ana (Επιμελητής έκδοσης), Leneutre, Jean (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
Σειρά:Lecture Notes in Computer Science, 6514
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03489nam a22006015i 4500
001 978-3-642-19348-4
003 DE-He213
005 20170112031640.0
007 cr nn 008mamaa
008 110211s2011 gw | s |||| 0|eng d
020 |a 9783642193484  |9 978-3-642-19348-4 
024 7 |a 10.1007/978-3-642-19348-4  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.M3 
072 7 |a UYZM  |2 bicssc 
072 7 |a UKR  |2 bicssc 
072 7 |a BUS083000  |2 bisacsh 
072 7 |a COM032000  |2 bisacsh 
082 0 4 |a 005.74  |2 23 
245 1 0 |a Data Privacy Management and Autonomous Spontaneous Security  |h [electronic resource] :  |b 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers /  |c edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2011. 
300 |a XIV, 259 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6514 
520 |a This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computers and Society. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Operating Systems. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Garcia-Alfaro, Joaquin.  |e editor. 
700 1 |a Navarro-Arribas, Guillermo.  |e editor. 
700 1 |a Cavalli, Ana.  |e editor. 
700 1 |a Leneutre, Jean.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642193477 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6514 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-19348-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)