This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, D.P.M. 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, S.E.T.O.P. 2010, collocated with the E.S.O.R.I.C.S. 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for D.P.M. 2010 presented together with two keynote talks are accompanied by 7 revised full papers of S.E.T.O.P. 2010; all papers were carefully reviewed and selected for inclusion in the book. The D.P.M. 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The S.E.T.O.P. 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, R.F.I.D. authentication, anonymity in reputation systems, etc.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, D.P.M. 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, S.E.T.O.P. 2010, collocated with the E.S.O.R.I.C.S. 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for D.P.M. 2010 presented together with two keynote talks are accompanied by 7 revised full papers of S.E.T.O.P. 2010; all papers were carefully reviewed and selected for inclusion in the book. The D.P.M. 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The S.E.T.O.P. 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, R.F.I.D. authentication, anonymity in reputation systems, etc.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 105,00 für den Versand von Deutschland nach USA
Versandziele, Kosten & DauerEUR 13,79 für den Versand von Vereinigtes Königreich nach USA
Versandziele, Kosten & DauerAnbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9783642193477_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. revised edition. 259 pages. 9.20x6.10x0.60 inches. In Stock. Artikel-Nr. x-3642193471
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc. Artikel-Nr. 9783642193477
Anzahl: 2 verfügbar
Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher. Artikel-Nr. 10284974/12
Anzahl: 1 verfügbar