Data privacy management and autonomous spontaneous security : 5th international workshop, DPM 2010 and 3rd international workshop, SETOP 2010, Athens, Greece, September 23, 2010 : revised selected papers /

Saved in:
Bibliographic Details
Meeting name:DPM (Workshop) (5th : 2010 : Athens, Greece)
Imprint:Berlin ; New York : Springer, ©2011.
Description:1 online resource (xiv, 258 pages) : illustrations.
Language:English
Series:Lecture notes in computer science, 1611-3349 ; 6514
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6514.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11075379
Hidden Bibliographic Details
Varying Form of Title:DPM 2010
SETOP 2010
Other authors / contributors:Garcia-Alfaro, Joaquin.
SETOP (Workshop) (3rd : 2010 : Athens, Greece)
ISBN:9783642193484
364219348X
3642193471
9783642193477
9783642193477
Notes:Includes bibliographical references and index.
Print version record.
Summary:Annotation This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.
Other form:Print version: Data privacy management and autonomous spontaneous security. Berlin : Springer, 2011 9783642193477