Synopsis
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, D.P.M. 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, S.E.T.O.P. 2010, collocated with the E.S.O.R.I.C.S. 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for D.P.M. 2010 presented together with two keynote talks are accompanied by 7 revised full papers of S.E.T.O.P. 2010; all papers were carefully reviewed and selected for inclusion in the book. The D.P.M. 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The S.E.T.O.P. 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, R.F.I.D. authentication, anonymity in reputation systems, etc.
Présentation de l'éditeur
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, D.P.M. 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, S.E.T.O.P. 2010, collocated with the E.S.O.R.I.C.S. 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for D.P.M. 2010 presented together with two keynote talks are accompanied by 7 revised full papers of S.E.T.O.P. 2010; all papers were carefully reviewed and selected for inclusion in the book. The D.P.M. 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The S.E.T.O.P. 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, R.F.I.D. authentication, anonymity in reputation systems, etc.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.