|
|
|
|
LEADER |
03268nam a22005895i 4500 |
001 |
10324 |
003 |
DE-He213 |
005 |
20130725195323.0 |
007 |
cr nn 008mamaa |
008 |
100306s2010 gw | s |||| 0|eng d |
020 |
# |
# |
|a 9783642112072
|9 978-3-642-11207-2
|
024 |
7 |
# |
|a 10.1007/978-3-642-11207-2
|2 doi
|
050 |
# |
4 |
|a QA76.9.A25
|
072 |
# |
7 |
|a UR
|2 bicssc
|
072 |
# |
7 |
|a UTN
|2 bicssc
|
072 |
# |
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
# |
|a Garcia-Alfaro, Joaquin.
|e editor.
|
245 |
1 |
0 |
|a Data Privacy Management and Autonomous Spontaneous Security
|b 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers /
|c edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier.
|h [electronic resource] :
|
264 |
# |
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2010.
|
300 |
# |
# |
|a XII, 265p. 50 illus.
|b online resource.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
347 |
# |
# |
|a text file
|b PDF
|2 rda
|
490 |
1 |
# |
|a Lecture Notes in Computer Science,
|v 5939
|x 0302-9743 ;
|
520 |
# |
# |
|a This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009. The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.
|
650 |
# |
0 |
|a Computer science.
|
650 |
# |
0 |
|a Computer Communication Networks.
|
650 |
# |
0 |
|a Data protection.
|
650 |
# |
0 |
|a Data encryption (Computer science).
|
650 |
# |
0 |
|a Computers
|x Law and legislation.
|
650 |
# |
0 |
|a Information Systems.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Data Encryption.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
650 |
2 |
4 |
|a Legal Aspects of Computing.
|
650 |
2 |
4 |
|a Computers and Society.
|
700 |
1 |
# |
|a Navarro-Arribas, Guillermo.
|e editor.
|
700 |
1 |
# |
|a Cuppens-Boulahia, Nora.
|e editor.
|
700 |
1 |
# |
|a Roudier, Yves.
|e editor.
|
710 |
2 |
# |
|a SpringerLink (Online service)
|
773 |
0 |
# |
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642112065
|
830 |
# |
0 |
|a Lecture Notes in Computer Science,
|v 5939
|x 0302-9743 ;
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-3-642-11207-2
|
912 |
# |
# |
|a ZDB-2-SCS
|
912 |
# |
# |
|a ZDB-2-LNC
|
950 |
# |
# |
|a Computer Science (Springer-11645)
|