04409nam 22007935 450 99646635620331620200630013707.03-319-29883-610.1007/978-3-319-29883-2(CKB)4340000000001289(SSID)ssj0001657802(PQKBManifestationID)16437591(PQKBTitleCode)TC0001657802(PQKBWorkID)14988673(PQKB)10979652(DE-He213)978-3-319-29883-2(MiAaPQ)EBC6286229(MiAaPQ)EBC5587411(Au-PeEL)EBL5587411(OCoLC)1066177459(PPN)192771612(EXLCZ)99434000000000128920160330d2016 u| 0engurnn#008mamaatxtccrData Privacy Management, and Security Assurance[electronic resource] 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers /edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XV, 291 p. 68 illus. in color.)Security and Cryptology ;9481Bibliographic Level Mode of Issuance: Monograph3-319-29882-8 Quantitative Aspects of Security Assurance -- Reputation, Monetization and Data Privacy Management -- Biometrics and Privacy Preservation -- Position Papers -- Short Papers.This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well.Security and Cryptology ;9481Computer securityManagement information systemsComputer scienceData encryption (Computer science)Application softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Computer security.Management information systems.Computer science.Data encryption (Computer science).Application software.Systems and Data Security.Management of Computing and Information Systems.Cryptology.Information Systems Applications (incl. Internet).005.8Garcia-Alfaro Joaquinedthttp://id.loc.gov/vocabulary/relators/edtNavarro-Arribas Guillermoedthttp://id.loc.gov/vocabulary/relators/edtAldini Alessandroedthttp://id.loc.gov/vocabulary/relators/edtMartinelli Fabioedthttp://id.loc.gov/vocabulary/relators/edtSuri Neerajedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466356203316Data Privacy Management and Security Assurance2597348UNISA