LEADER 03597nam 22006975 450 001 9910483146403321 005 20251113174222.0 010 $a3-642-54568-8 024 7 $a10.1007/978-3-642-54568-9 035 $a(CKB)3710000000095058 035 $a(DE-He213)978-3-642-54568-9 035 $a(SSID)ssj0001187101 035 $a(PQKBManifestationID)11976582 035 $a(PQKBTitleCode)TC0001187101 035 $a(PQKBWorkID)11256787 035 $a(PQKB)10791257 035 $a(MiAaPQ)EBC3093328 035 $a(PPN)177824492 035 $a(EXLCZ)993710000000095058 100 $a20140320d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Privacy Management and Autonomous Spontaneous Security $e8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XVII, 400 p. 105 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v8247 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-54567-X 330 $aThis book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v8247 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData and Information Security 606 $aIT Operations 606 $aCryptology 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData and Information Security. 615 24$aIT Operations. 615 24$aCryptology. 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLioudakis$b Georgios$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens-Boulahia$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFoley$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFitzgerald$b William M$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483146403321 996 $aData Privacy Management and Autonomous Spontaneous Security$92830020 997 $aUNINA