04477nam 22007575 450 991048417960332120200701035009.03-319-47072-810.1007/978-3-319-47072-6(CKB)3710000000872968(DE-He213)978-3-319-47072-6(MiAaPQ)EBC5586832(Au-PeEL)EBL5586832(OCoLC)959925843(PPN)19551145X(EXLCZ)99371000000087296820160921d2016 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierData Privacy Management and Security Assurance[electronic resource] 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /edited by Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XIV, 247 p. 74 illus.)Security and Cryptology ;99633-319-47071-X Management of privacy-sensitive informations -- Translation of high-level business goals into system-level privacy policies -- Administration of sensitive identifiers -- Data integration and privacy engineering.-Service oriented architectures -- Aspects of dependability, privacy, risk and trust. .This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. .Security and Cryptology ;9963Computer securityManagement information systemsComputer scienceData encryption (Computer science)Application softwareAlgorithmsSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer security.Management information systems.Computer science.Data encryption (Computer science).Application software.Algorithms.Systems and Data Security.Management of Computing and Information Systems.Cryptology.Information Systems Applications (incl. Internet).Algorithm Analysis and Problem Complexity.005.8Livraga Giovanniedthttp://id.loc.gov/vocabulary/relators/edtTorra Vicençedthttp://id.loc.gov/vocabulary/relators/edtAldini Alessandroedthttp://id.loc.gov/vocabulary/relators/edtMartinelli Fabioedthttp://id.loc.gov/vocabulary/relators/edtSuri Neerajedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484179603321Data Privacy Management and Security Assurance2597348UNINA