| 000 | 03347nam a22005895i 4500 | ||
|---|---|---|---|
| 001 | 978-3-642-28879-1 | ||
| 003 | DE-He213 | ||
| 005 | 20140220083314.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 120312s2012 gw | s |||| 0|eng d | ||
| 020 |
_a9783642288791 _9978-3-642-28879-1 |
||
| 024 | 7 |
_a10.1007/978-3-642-28879-1 _2doi |
|
| 050 | 4 | _aQA76.9.M3 | |
| 072 | 7 |
_aUYZM _2bicssc |
|
| 072 | 7 |
_aUKR _2bicssc |
|
| 072 | 7 |
_aBUS083000 _2bisacsh |
|
| 072 | 7 |
_aCOM032000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.74 _223 |
| 100 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. |
|
| 245 | 1 | 0 |
_aData Privacy Management and Autonomous Spontaneus Security _h[electronic resource] : _b6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati. |
| 264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2012. |
|
| 300 |
_aXV, 319 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7122 |
|
| 520 | _aThis book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration. | ||
| 650 | 0 | _aComputer science. | |
| 650 | 0 | _aComputer Communication Networks. | |
| 650 | 0 | _aOperating systems (Computers). | |
| 650 | 0 | _aData encryption (Computer science). | |
| 650 | 0 | _aInformation Systems. | |
| 650 | 1 | 4 | _aComputer Science. |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems. |
| 650 | 2 | 4 | _aData Encryption. |
| 650 | 2 | 4 | _aComputers and Society. |
| 650 | 2 | 4 | _aComputer Communication Networks. |
| 650 | 2 | 4 | _aOperating Systems. |
| 650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
| 700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. |
|
| 700 | 1 |
_aCuppens-Boulahia, Nora. _eeditor. |
|
| 700 | 1 |
_aCapitani di Vimercati, Sabrina. _eeditor. |
|
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9783642288784 |
| 830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7122 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-28879-1 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c102910 _d102910 |
||