ISBN-10:
3642112064
ISBN-13:
9783642112065
Pub. Date:
03/26/2010
Publisher:
Springer Berlin Heidelberg
Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / Edition 1

Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / Edition 1

Paperback

Current price is , Original price is $99.0. You
Select a Purchase Option (2010)
  • purchase options
    $66.74 $99.00 Save 33% Current price is $66.74, Original price is $99. You Save 33%.
  • purchase options

Product Details

ISBN-13: 9783642112065
Publisher: Springer Berlin Heidelberg
Publication date: 03/26/2010
Series: Lecture Notes in Computer Science , #5939
Edition description: 2010
Pages: 265
Product dimensions: 6.00(w) x 9.10(h) x 0.70(d)

Table of Contents

Keynote Talks.- The UNESCO Chair in Data Privacy Research in Vehicular Networks.- Privacy Management for Global Organizations.- Data Privacy Management.- Obligation Language and Framework to Enable Privacy-Aware SOA.- Distributed Privacy-Preserving Methods for Statistical Disclosure Control.- Towards a Privacy-Preserving National Identity Card.- Using SAT-Solvers to Compute Inference-Proof Database Instances.- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem.- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search.- Visualizing Privacy Implications of Access Control Policies in Social Network Systems.- Contextual Privacy Management in Extended Role Based Access Control Model.- Autonomous and Spontaneous Security.- Dynamic Security Rules for Geo Data.- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking.- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets).- Untraceable Tags Based on Mild Assumptions.- Security Threat Mitigation Trends in Low-Cost RFID Systems.- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification.- DDoS Defense Mechanisms: A New Taxonomy.- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems.- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges.

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews