LEADER 03610nam 22007335 450 001 9910298566903321 005 20251226203309.0 010 $a3-642-55415-6 024 7 $a10.1007/978-3-642-55415-5 035 $a(CKB)3710000000119213 035 $a(DE-He213)978-3-642-55415-5 035 $a(SSID)ssj0001237538 035 $a(PQKBManifestationID)11696526 035 $a(PQKBTitleCode)TC0001237538 035 $a(PQKBWorkID)11267815 035 $a(PQKB)10576054 035 $a(MiAaPQ)EBC3093010 035 $a(PPN)178783889 035 $a(EXLCZ)993710000000119213 100 $a20140512d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aICT Systems Security and Privacy Protection $e29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings /$fedited by Nora Cuppens-Boulahia, Frederic Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XIV, 494 p. 94 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v428 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-55414-8 327 $aIntrusion detection -- Data security -- Mobile security -- Privacy -- Metrics and risk assessment -- Information flow control -- Identity management -- Identifiability and decision making -- Malicious behavior and fraud -- Organizational security. 330 $aThis book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised full papers and 14 short papers presented were carefully reviewed and selected from 151 submissions. The papers are organized in topical sections on intrusion detection, data security, mobile security, privacy, metrics and risk assessment, information flow control, identity management, identifiability and decision making, malicious behavior and fraud and organizational security. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v428 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aDatabase management 606 $aData and Information Security 606 $aIT Operations 606 $aComputer Communication Networks 606 $aDatabase Management 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aDatabase management. 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aDatabase Management. 676 $a005.8 702 $aCuppens-Boulahia$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJajodia$b Sushil$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAbou El Kalam$b Anas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSans$b Thierry$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298566903321 996 $aICT Systems Security and Privacy Protection$92034030 997 $aUNINA