LEADER 01154nam0-22003251i-450- 001 990005395460403321 005 20070622090839.0 035 $a000539546 035 $aFED01000539546 035 $a(Aleph)000539546FED01 035 $a000539546 100 $a19990604d1979----km-y0itay50------ba 101 0 $afre 105 $ay---b---00--- 200 1 $aDe Neron a Vespasien$eetudes et perspectives historiques suivies de l'analyse du catalogue, et de la reproduction des monnaies "oppositionneles" connues des années 67 a 70$fpar Etienne Paul Nicolas 210 $aParis$cLes Belles Lettres$d1979 215 $a2 v. (1500 p., XXII p. di tav., 1 c. di tav. ripieg.)$cill. in b. e n.$d29 cm 225 1 $aCollection d'études anciennes 610 0 $aRoma antica$aStoria$aImpero 610 0 $aMonete romane$aEtà imperiale$aCataloghi 676 $a937.06 676 $a737.49376 700 1$aNicolas,$bEtienne Paul$0209459 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005395460403321 952 $a737.49 NIC 1 (1-2)$bANT. G. R. 3951$fFLFBC 959 $aFLFBC 996 $aDe Neron a Vespasien$9595859 997 $aUNINA LEADER 04976nam 22007695 450 001 9910483928503321 005 20251226195548.0 010 $a3-319-20810-1 024 7 $a10.1007/978-3-319-20810-7 035 $a(CKB)3710000000436925 035 $a(SSID)ssj0001558483 035 $a(PQKBManifestationID)16183641 035 $a(PQKBTitleCode)TC0001558483 035 $a(PQKBWorkID)14818597 035 $a(PQKB)10015351 035 $a(DE-He213)978-3-319-20810-7 035 $a(MiAaPQ)EBC6287395 035 $a(MiAaPQ)EBC5587046 035 $a(Au-PeEL)EBL5587046 035 $a(OCoLC)912863650 035 $a(PPN)18639974X 035 $a(EXLCZ)993710000000436925 100 $a20150622d2015 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData and Applications Security and Privacy XXIX $e29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings /$fedited by Pierangela Samarati 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XI, 364 p. 60 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9149 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-20809-8 327 $aMR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce -- Towards Collaborative Query Planning in Multi-party Database Networks -- Privacy-Preserving Range Queries from Keyword Queries -- An Administrative Model for Relationship-Based Access Control -- Migrating from DAC to RBAC -- Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios -- Privacy Preserving Record Matching Using Automated Semi-trusted Broker -- Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid -- Privacy-Preserving Public Transport Ticketing System -- Expiration and Revocation of Keys for Attribute-Based Signatures -- Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis -- Constructing Inference-Proof Belief Mediators -- Personalized Composition of Trustful Reputation Systems -- FamilyID: A Hybrid Approach to Identify Family Information from Microblogs -- Sanitization of Call Detail Records via Differentially-Private Bloom Filters -- Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System -- Integrating Attributes into Role-Based Access Control -- Automated Translation of End User Policies for Usage Control Enforcement -- Defensive Resource Allocations with Security Chokepoints in IPv6 Networks -- A Topology Based Flow Model for Computing Domain Reputation -- FPGuard: Detection and Prevention of Browser Fingerprinting -- Stream Processing with Secure Information Flow Constraints -- Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data. 330 $aThis book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9149 606 $aData protection 606 $aDatabase management 606 $aElectronic data processing$xManagement 606 $aApplication software 606 $aComputer networks 606 $aData and Information Security 606 $aDatabase Management 606 $aIT Operations 606 $aComputer and Information Systems Applications 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aDatabase management. 615 0$aElectronic data processing$xManagement. 615 0$aApplication software. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aDatabase Management. 615 24$aIT Operations. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aSamarati$b Pierangela$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483928503321 996 $aData and Applications Security and Privacy XXIX$92831570 997 $aUNINA