LEADER 03852nam 22007695 450 001 996465500203316 005 20200630020309.0 010 $a3-642-22348-6 024 7 $a10.1007/978-3-642-22348-8 035 $a(CKB)2670000000095960 035 $a(SSID)ssj0000530753 035 $a(PQKBManifestationID)11339081 035 $a(PQKBTitleCode)TC0000530753 035 $a(PQKBWorkID)10568366 035 $a(PQKB)11077438 035 $a(DE-He213)978-3-642-22348-8 035 $a(MiAaPQ)EBC3066907 035 $a(PPN)153865776 035 $a(EXLCZ)992670000000095960 100 $a20110628d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData and Applications Security and Privacy XXV $e25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings /$fedited by Yingjiu Li 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XI, 309 p. 90 illus., 32 illus. in color.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v6818 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-22347-8 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v6818 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aApplication software 606 $aAlgorithms 606 $aComputer security 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aApplication software. 615 0$aAlgorithms. 615 0$aComputer security. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 676 $a004.6 702 $aLi$b Yingjiu$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465500203316 996 $aData and Applications Security and Privacy XXV$92829848 997 $aUNISA