Data privacy management and autonomous spontaneus [sic] security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers /

Saved in:
Bibliographic Details
Meeting name:DPM (Workshop) (6th : 2011 : Louvain, Belgium)
Imprint:Berlin ; New York : Springer, ©2012.
Description:1 online resource (xv, 318 pages).
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 7122
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7122.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11076747
Hidden Bibliographic Details
Varying Form of Title:Data privacy management and autonomous spontaneous security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised selected papers
DPM 2011
SETOP 2011
Other authors / contributors:Garcia-Alfaro, Joaquin.
SETOP (Workshop) (4th : 2011 : Louvain, Belgium)
ISBN:9783642288791
3642288790
9783642288784
Notes:Includes bibliographical references and author index.
Summary:Annotation This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.
Other form:Printed edition: 9783642288784
Standard no.:10.1007/978-3-642-28879-1