Vai al contenuto principale della pagina

Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati Visualizza cluster
Pubblicazione: Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Edizione: 1st ed. 2012.
Descrizione fisica: 1 online resource (XV, 319 p.)
Disciplina: 005.8
Soggetto topico: Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer communication systems
Operating systems (Computers)
Application software
Management of Computing and Information Systems
Cryptology
Computers and Society
Computer Communication Networks
Operating Systems
Information Systems Applications (incl. Internet)
Persona (resp. second.): Garcia-AlfaroJoaquin
Navarro-ArribasGuillermo
Cuppens-BoulahiaNora
De Capitani di VimercatiSabrina
Note generali: Bibliographic Level Mode of Issuance: Monograph
Nota di bibliografia: Includes bibliographical references and author index.
Nota di contenuto: Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros
Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg.
Sommario/riassunto: This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.
Titolo autorizzato: Data Privacy Management and Autonomous Spontaneus Security  Visualizza cluster
ISBN: 3-642-28879-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996466249203316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Security and Cryptology ; ; 7122