0
Your cart

Your cart is empty

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Buy Now

Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers (Paperback, Edition.) Loot Price: R1,591
Discovery Miles 15 910
Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International...

Data Privacy Management and Autonomous Spontaneous Security - 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers (Paperback, Edition.)

Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre

Series: Security and Cryptology, 6514

 (sign in to rate)
Loot Price R1,591 Discovery Miles 15 910 | Repayment Terms: R149 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

General

Imprint: Springer-Verlag
Country of origin: Germany
Series: Security and Cryptology, 6514
Release date: February 2011
First published: 2011
Editors: Joaquin Garcia-Alfaro • Guillermo Navarro-Arribas • Ana Cavalli • Jean Leneutre
Dimensions: 235 x 155 x 15mm (L x W x T)
Format: Paperback
Pages: 259
Edition: Edition.
ISBN-13: 978-3-642-19347-7
Categories: Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology
Books > Computing & IT > Internet > Network computers
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > General
Books > Computing & IT > Applications of computing > Databases > General
Promotions
LSN: 3-642-19347-1
Barcode: 9783642193477

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners