LEADER 04477nam 22007575 450 001 9910484179603321 005 20200701035009.0 010 $a3-319-47072-8 024 7 $a10.1007/978-3-319-47072-6 035 $a(CKB)3710000000872968 035 $a(DE-He213)978-3-319-47072-6 035 $a(MiAaPQ)EBC5586832 035 $a(Au-PeEL)EBL5586832 035 $a(OCoLC)959925843 035 $a(PPN)19551145X 035 $a(EXLCZ)993710000000872968 100 $a20160921d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Privacy Management and Security Assurance$b[electronic resource] $e11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /$fedited by Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XIV, 247 p. 74 illus.) 225 1 $aSecurity and Cryptology ;$v9963 311 $a3-319-47071-X 327 $aManagement of privacy-sensitive informations -- Translation of high-level business goals into system-level privacy policies -- Administration of sensitive identifiers -- Data integration and privacy engineering.-Service oriented architectures -- Aspects of dependability, privacy, risk and trust. . 330 $aThis book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. . 410 0$aSecurity and Cryptology ;$v9963 606 $aComputer security 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aApplication software 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aLivraga$b Giovanni$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTorra$b Vicenç$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAldini$b Alessandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMartinelli$b Fabio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSuri$b Neeraj$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484179603321 996 $aData Privacy Management and Security Assurance$92597348 997 $aUNINA