01020nam--2200337---450-99000610631020331620151215170142.0978-88-916-1373-8000610631USA01000610631(ALEPH)000610631USA0100061063120151215d2015----km-y0itay50------baitaIT||||||||001yy<<Il>> condominio e gli adempimenti in materia di privacyGianfranco Di RagoSantarcangelo di RomagnaMaggioli2015168 p.24 cmImmobili & condominio57Immobili & condominio, 57CondominiBNCFDI RAGO,Gianfranco513102ITsalbcISBD990006106310203316XXV.1.F. 37883463 G.XXV.1.F.00348558BKGIUCHIARA9020151215USA011701Condominio e gli adempimenti in materia di privacy1383813UNISA05687nam 22007935 450 99646614150331620200706222518.03-540-68963-X10.1007/11961635(CKB)1000000000283888(SSID)ssj0000318300(PQKBManifestationID)11266630(PQKBTitleCode)TC0000318300(PQKBWorkID)10308464(PQKB)11689258(DE-He213)978-3-540-68963-8(MiAaPQ)EBC3068507(PPN)123140161(EXLCZ)99100000000028388820100301d2006 u| 0engurnn|008mamaatxtccrInformation Systems Security[electronic resource] Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings /edited by Aditya Bagchi, Vijayalakshmi Atluri1st ed. 2006.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2006.1 online resource (XVI, 384 p.) Security and Cryptology ;4332Bibliographic Level Mode of Issuance: Monograph3-540-68962-1 Includes bibliographical references and index.Invited Papers -- Privacy in the Electronic Society -- A Data Sharing Agreement Framework -- Password Exhaustion: Predicting the End of Password Usefulness -- Network Monitoring for Security and Forensics -- Data and Application Security -- Fairness Strategy for Multilevel Secure Concurrency Control Protocol -- Optimistic Anonymous Participation in Inter-organizational Workflow Instances -- O2O: Virtual Private Organizations to Manage Security Policy Interoperability -- Privacy Preserving Web-Based Email -- Access Control -- Context-Aware Provisional Access Control -- LRBAC: A Location-Aware Role-Based Access Control Model -- Extending Context Descriptions in Semantics-Aware Access Control -- Specification and Realization of Access Control in SPKI/SDSI -- Key Management and Security in Wireless Networks -- Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack -- An Efficient Key Assignment Scheme for Access Control in a Hierarchy -- Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers -- Secure Data Management in Reactive Sensor Networks -- Threat Analysis, Detection and Recovery -- Security Ontology: Simulating Threats to Corporate Assets -- Two-Stage Credit Card Fraud Detection Using Sequence Alignment -- New Malicious Code Detection Using Variable Length n-grams -- A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes -- Cryptography and Encryption -- An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack -- A Partial Image Encryption Method with Pseudo Random Sequences -- High Capacity Lossless Data Hiding -- An Implementation and Evaluation of Online Disk Encryption for Windows Systems -- Short Papers and Research Reports -- Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract) -- A Survey of Control-Flow Obfuscations -- Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments -- Secure Itineraries Framework for Mobile Agent Systems -- Malafide Intension Based Detection of Privacy Violation in Information System -- Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report) -- Towards a Formal Specification Method for Enterprise Information System Security -- Recent Research on Privacy Preserving Data Mining.Security and Cryptology ;4332Data encryption (Computer science)Computer communication systemsComputer securityComputers and civilizationManagement information systemsComputer scienceInformation storage and retrievalCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Data encryption (Computer science).Computer communication systems.Computer security.Computers and civilization.Management information systems.Computer science.Information storage and retrieval.Cryptology.Computer Communication Networks.Systems and Data Security.Computers and Society.Management of Computing and Information Systems.Information Storage and Retrieval.05.8Bagchi Adityaedthttp://id.loc.gov/vocabulary/relators/edtAtluri Vijayalakshmiedthttp://id.loc.gov/vocabulary/relators/edtICISS (Conference)BOOK996466141503316Information Systems Security771916UNISA