LEADER 07743nam 22008535 450 001 996466249203316 005 20210106073057.0 010 $a3-642-28879-0 024 7 $a10.1007/978-3-642-28879-1 035 $a(CKB)3360000000365949 035 $a(SSID)ssj0000666034 035 $a(PQKBManifestationID)11955873 035 $a(PQKBTitleCode)TC0000666034 035 $a(PQKBWorkID)10647086 035 $a(PQKB)10065480 035 $a(DE-He213)978-3-642-28879-1 035 $a(MiAaPQ)EBC3069936 035 $a(PPN)168313103 035 $a(EXLCZ)993360000000365949 100 $a20120312d2012 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aData Privacy Management and Autonomous Spontaneus Security$b[electronic resource] $e6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers /$fedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XV, 319 p.) 225 1 $aSecurity and Cryptology ;$v7122 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-28878-2 320 $aIncludes bibliographical references and author index. 327 $tPrivacy Challenges in RFID /$rGildas Avoine --$tFake Injection Strategies for Private Phonetic Matching /$rAlexandros Karakasidis, Vassilios S. Verykios and Peter Christen --$tA Design Phase for Data Sharing Agreements /$rIlaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand --$tA Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings /$rJavier Parra-Arnau, David Rebollo-Monedero and Jordi Forne? --$tOn the Complexity of Aggregating Information for Authentication and Profiling /$rChristian A. Duncan and Vir V. Phoha --$tSecure and Privacy-Aware Searching in Peer-to-Peer Networks /$rJaydip Sen --$tOn the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol /$rMasoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam --$tInference-Proof View Update Transactions with Minimal Refusals /$rJoachim Biskup and Cornelia Tadros 327 $tRepresentation-Independent Data Usage Control /$rAlexander Pretschner, Enrico Lovat and Matthias Bu?chler --$tUsing Personal Portfolios to Manage Customer Data /$rAimilia Tasidou and Pavlos S. Efraimidis --$tUsing Requirements Engineering in an Automatic Security Policy Derivation Process /$rMariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Fre?de?ric Cuppens, et al. --$tWeb Services Verification and Prudent Implementation /$rTigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michae?l Rusinowitch --$tEvolving Security Requirements in Multi-layered Service-Oriented-Architectures /$rMuhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. --$tRisk-Based Auto-delegation for Probabilistic Availability /$rLeanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin --$tIntra-role Progression in RBAC: An RPG-Like Access Control Scheme / 327 $rCarles Marti?nez-Garci?a, Guillermo Navarro-Arribas and Joan Borrell --$tDistributed Orchestration of Web Services under Security Constraints /$rTigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michae?l Rusinowitch and Mathieu Turuani --$tOn the Key Schedule Strength of PRESENT /$rJulio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson --$tA Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines /$rEnric Pujol-Gil and Nikolaos Chatzis --$tNetwork Securing against Threatening Requests /$rYulong Fu and Ousmane Kone --$tA Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring /$rMaria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris --$tControlling Data Dissemination /$rHelge Janicke, Mohamed Sarrab and Hamza Aldabbas --$tA Framework of Deployment Strategy for Hierarchical WSN Security Management /$rChristine Hennebert and Vincent Berg. 330 $aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration. 410 0$aSecurity and Cryptology ;$v7122 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aApplication software 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aApplication software. 615 14$aManagement of Computing and Information Systems. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aGarcia-Alfaro$b Joaquin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNavarro-Arribas$b Guillermo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCuppens-Boulahia$b Nora$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDe Capitani di Vimercati$b Sabrina$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aSETOP 2011$f(2011 :$eLouvain, Belgium) 906 $aBOOK 912 $a996466249203316 996 $aData Privacy Management and Autonomous Spontaneus Security$92830968 997 $aUNISA