Data Privacy Management and Autonomous Spontaneous Security
5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers
Seiten
2011
|
2011
Springer Berlin (Verlag)
978-3-642-19347-7 (ISBN)
Springer Berlin (Verlag)
978-3-642-19347-7 (ISBN)
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
Erscheint lt. Verlag | 22.2.2011 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 259 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 392 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Mathematik / Informatik ► Informatik ► Netzwerke | |
Informatik ► Software Entwicklung ► User Interfaces (HCI) | |
Informatik ► Theorie / Studium ► Kryptologie | |
Informatik ► Weitere Themen ► Hardware | |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Schlagworte | anonymization • anonymizing algorithms • cryptographic privacy protocols • data publishing privacy • Digital Payment Systems • network monitoring privacy • network security policies • privacy enforcement • Privacy-Enhancing Technologies • reputation systems anonymity • Secret Sharing • secure RFID authentication • security management strategies • Surveillance • trust models • virtualized security |
ISBN-10 | 3-642-19347-1 / 3642193471 |
ISBN-13 | 978-3-642-19347-7 / 9783642193477 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Aus- und Weiterbildung nach iSAQB-Standard zum Certified Professional …
Buch | Hardcover (2023)
dpunkt Verlag
34,90 €
Lean UX und Design Thinking: Teambasierte Entwicklung …
Buch | Hardcover (2022)
dpunkt (Verlag)
34,90 €
Wissensverarbeitung - Neuronale Netze
Buch | Hardcover (2023)
Carl Hanser (Verlag)
34,99 €