LEADER 01184cam2-22003491i-450- 001 990008323300403321 005 20061215123449.0 010 $a88-7689-206-0 035 $a000832330 035 $aFED01000832330 035 $a(Aleph)000832330FED01 035 $a000832330 100 $a20060509d2002----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $aaf------001yy 200 1 $aRegio 3., 4$eun tempio arcaico nel territorio dell'antica Temesa$el'edificio sacro in località Imbelli di Campora San Giovanni$fGioacchino Francesco La Torre 210 $aRoma$cGiorgio Bretschneider$d2002 215 $a388 p., 17 p. di tav.$cill.$d30 cm 225 1 $aArchaeologica$x0391-9293$v133 461 0$1001000404829$12001$aCorpus delle stipi votive in Italia$v14 517 1 $a<>tempio arcaico nel territorio dell'antica Temesa 610 0 $aStipi votivi$aTemesa$aOggetti di scavo 676 $a937.7 700 1$aLa Torre,$bGioacchino Francesco$0259699 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990008323300403321 952 $a937.7 LAT 1$bBibl.53463$fFLFBC 959 $aFLFBC 996 $aRegio 3., 4$9743765 997 $aUNINA LEADER 04765nam 22008535 450 001 9910484369403321 005 20251226202240.0 010 $a3-642-03748-8 024 7 $a10.1007/978-3-642-03748-1 035 $a(CKB)1000000000784764 035 $a(SSID)ssj0000320515 035 $a(PQKBManifestationID)11256855 035 $a(PQKBTitleCode)TC0000320515 035 $a(PQKBWorkID)10249337 035 $a(PQKB)11715054 035 $a(DE-He213)978-3-642-03748-1 035 $a(MiAaPQ)EBC3064502 035 $a(PPN)139951067 035 $a(EXLCZ)991000000000784764 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrust, Privacy and Security in Digital Business $e6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009, Proceedings /$fedited by Simone Fischer-Hübner, Costas Lambrinoudakis, Günther Pernul 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XII, 169 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5695 300 $aInternational conference proceedings. 311 08$a3-642-03747-X 320 $aIncludes bibliographical references and index. 327 $aUser Profiling and Privacy in Digital Business -- User Profiling and Re-identification: Case of University-Wide Network Analysis -- Search Engines: Gateway to a New ?Panopticon?? -- Privacy Enhancing Technologies and Identity Management -- Supporting Local Aliases as Usable Presentation of Secure Pseudonyms -- A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking -- An Anonymous Credit Card System -- Security and Privacy in Real Life Applications -- A Cluster-Based Framework for the Security of Medical Sensor Environments -- Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach -- A Formalization of HIPAA for a Medical Messaging System -- Reputation and Security Measurements -- Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems -- Steering Security through Measurement -- Advanced Features in Bayesian Reputation Systems -- Access Control -- An MDA-Based Environment for Generating Access Control Policies -- An Extended Role-Based Access Control Model for Delegating Obligations -- The OPL Access Control Policy Language -- Authentication and Authorisation -- Operational Semantics for DKAL: Application and Analysis -- HB???MAC: Improving the Random???HB # Authentication Protocol. 330 $aThis book constitutes the refereed proceedings of the 6th International Conference on Trust and Privacy in Digital Business, TrustBus 2009, held in Linz, Austria, in September 2009 in conjunction with DEXA 2009. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on user profiling and privacy in digital business; privacy enhancing technologies and identity management; security and privacy in real life applications; reputation and security measurements; access control; and authentication and authorisation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5695 606 $aData protection 606 $aElectronic commerce 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aComputer networks 606 $aBusiness information services 606 $aData and Information Security 606 $ae-Commerce and e-Business 606 $aCryptology 606 $aIT Operations 606 $aComputer Communication Networks 606 $aIT in Business 615 0$aData protection. 615 0$aElectronic commerce. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aComputer networks. 615 0$aBusiness information services. 615 14$aData and Information Security. 615 24$ae-Commerce and e-Business. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aComputer Communication Networks. 615 24$aIT in Business. 676 $a005.8 701 $aFischer-Hubner$b Simone$0552818 701 $aLambrinoudakis$b Costas$01731902 701 $aPernul$b G$g(Gunther),$f1961-$01220848 712 12$aTrustBus 2009 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484369403321 996 $aTrust, privacy and security in digital business$94201998 997 $aUNINA