LEADER 04801nam 22008175 450 001 996465677503316 005 20210106072101.0 010 $a3-642-19348-X 024 7 $a10.1007/978-3-642-19348-4 035 $a(CKB)2670000000071964 035 $a(SSID)ssj0000476037 035 $a(PQKBManifestationID)11312465 035 $a(PQKBTitleCode)TC0000476037 035 $a(PQKBWorkID)10479172 035 $a(PQKB)11594760 035 $a(DE-He213)978-3-642-19348-4 035 $a(MiAaPQ)EBC3066448 035 $a(PPN)151585067 035 $a(EXLCZ)992670000000071964 100 $a20110211d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData Privacy Management and Autonomous Spontaneous Security$b[electronic resource] $e5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIV, 259 p.) 225 1 $aSecurity and Cryptology ;$v6514 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-19347-1 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc. 410 0$aSecurity and Cryptology ;$v6514 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aApplication software 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 14$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.74 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNavarro-Arribas$b Guillermo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCavalli$b Ana$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLeneutre$b Jean$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSETOP 2009$f(2009 :$eSaint-Malo, France) 906 $aBOOK 912 $a996465677503316 996 $aData Privacy Management and Autonomous Spontaneous Security$92830020 997 $aUNISA