LEADER 04384nam 22007935 450 001 9910483656603321 005 20200630013707.0 010 $a3-319-29883-6 024 7 $a10.1007/978-3-319-29883-2 035 $a(CKB)4340000000001289 035 $a(SSID)ssj0001657802 035 $a(PQKBManifestationID)16437591 035 $a(PQKBTitleCode)TC0001657802 035 $a(PQKBWorkID)14988673 035 $a(PQKB)10979652 035 $a(DE-He213)978-3-319-29883-2 035 $a(MiAaPQ)EBC6286229 035 $a(MiAaPQ)EBC5587411 035 $a(Au-PeEL)EBL5587411 035 $a(OCoLC)1066177459 035 $a(PPN)192771612 035 $a(EXLCZ)994340000000001289 100 $a20160330d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData Privacy Management, and Security Assurance $e10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XV, 291 p. 68 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9481 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-29882-8 327 $aQuantitative Aspects of Security Assurance -- Reputation, Monetization and Data Privacy Management -- Biometrics and Privacy Preservation -- Position Papers -- Short Papers. 330 $aThis book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well. 410 0$aSecurity and Cryptology ;$v9481 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNavarro-Arribas$b Guillermo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAldini$b Alessandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMartinelli$b Fabio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSuri$b Neeraj$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483656603321 996 $aData Privacy Management and Security Assurance$92597348 997 $aUNINA