Coverart for item
The Resource Data privacy management and autonomous spontaneus security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers, Joaquin Garcia-Alfaro ... [et al.] (eds.), (electronic resource)

Data privacy management and autonomous spontaneus security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers, Joaquin Garcia-Alfaro ... [et al.] (eds.), (electronic resource)

Label
Data privacy management and autonomous spontaneus security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers
Title
Data privacy management and autonomous spontaneus security
Title remainder
6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers
Statement of responsibility
Joaquin Garcia-Alfaro ... [et al.] (eds.)
Title variation
  • Data privacy management and autonomous spontaneous security
  • DPM 2011
  • SETOP 2011
Creator
Contributor
Subject
Genre
Language
eng
Summary
  • This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration
  • Annotation:
Member of
Cataloging source
N5L
Dewey number
005.8
Form designation
monograph
LC call number
QA76.9.A97
LC item number
D76 2011
http://bibfra.me/vocab/lite/meetingDate
2011
http://bibfra.me/vocab/lite/meetingName
DPM (Workshop)
http://library.link/vocab/relatedWorkOrContributorDate
2011
http://library.link/vocab/relatedWorkOrContributorName
  • Garcia-Alfaro, Joaquin
  • SETOP (Workshop)
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7122
http://library.link/vocab/subjectName
  • Computer security
  • Data protection
  • Data encryption (Computer science)
  • Computer networks
Summary expansion
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration
Label
Data privacy management and autonomous spontaneus security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers, Joaquin Garcia-Alfaro ... [et al.] (eds.), (electronic resource)
Instantiates
Publication
Note
Title misspelled and should read: Data privacy management and autonomous spontaneous security
Bibliography note
Includes bibliographical references and index
Contents
  • On the Complexity of Aggregating Information for Authentication and Profiling
  • Christian A. Duncan and Vir V. Phoha
  • Secure and Privacy-Aware Searching in Peer-to-Peer Networks
  • Jaydip Sen
  • On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam
  • Inference-Proof View Update Transactions with Minimal Refusals
  • Joachim Biskup and Cornelia Tadros
  • Privacy Challenges in RFID
  • Gildas Avoine
  • Fake Injection Strategies for Private Phonetic Matching
  • Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen
  • A Design Phase for Data Sharing Agreements
  • Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand
  • A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
  • Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné
  • Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
  • Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al.
  • Risk-Based Auto-delegation for Probabilistic Availability
  • Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin
  • Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
  • Representation-Independent Data Usage Control
  • Alexander Pretschner, Enrico Lovat and Matthias Büchler
  • Using Personal Portfolios to Manage Customer Data
  • Aimilia Tasidou and Pavlos S. Efraimidis
  • Using Requirements Engineering in an Automatic Security Policy Derivation Process
  • Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al.
  • Web Services Verification and Prudent Implementation
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch
  • Yulong Fu and Ousmane Kone
  • A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring
  • Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris
  • Controlling Data Dissemination
  • Helge Janicke, Mohamed Sarrab and Hamza Aldabbas
  • A Framework of Deployment Strategy for Hierarchical WSN Security Management
  • Christine Hennebert and Vincent Berg
  • Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell
  • Distributed Orchestration of Web Services under Security Constraints
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani
  • On the Key Schedule Strength of PRESENT
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson
  • A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines
  • Enric Pujol-Gil and Nikolaos Chatzis
  • Network Securing against Threatening Requests
  • On the Complexity of Aggregating Information for Authentication and Profiling
  • Christian A. Duncan and Vir V. Phoha
  • Secure and Privacy-Aware Searching in Peer-to-Peer Networks
  • Jaydip Sen
  • On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam
  • Inference-Proof View Update Transactions with Minimal Refusals
  • Joachim Biskup and Cornelia Tadros
  • Privacy Challenges in RFID
  • Gildas Avoine
  • Fake Injection Strategies for Private Phonetic Matching
  • Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen
  • A Design Phase for Data Sharing Agreements
  • Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand
  • A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
  • Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné
  • Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
  • Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al.
  • Risk-Based Auto-delegation for Probabilistic Availability
  • Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin
  • Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
  • Representation-Independent Data Usage Control
  • Alexander Pretschner, Enrico Lovat and Matthias Büchler
  • Using Personal Portfolios to Manage Customer Data
  • Aimilia Tasidou and Pavlos S. Efraimidis
  • Using Requirements Engineering in an Automatic Security Policy Derivation Process
  • Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al.
  • Web Services Verification and Prudent Implementation
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch
  • Yulong Fu and Ousmane Kone
  • A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring
  • Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris
  • Controlling Data Dissemination
  • Helge Janicke, Mohamed Sarrab and Hamza Aldabbas
  • A Framework of Deployment Strategy for Hierarchical WSN Security Management
  • Christine Hennebert and Vincent Berg
  • Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell
  • Distributed Orchestration of Web Services under Security Constraints
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani
  • On the Key Schedule Strength of PRESENT
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson
  • A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines
  • Enric Pujol-Gil and Nikolaos Chatzis
  • Network Securing against Threatening Requests
Control code
OCM1bookssj0000666034
Dimensions
unknown
Isbn
9783642288784
Isbn Type
(pbk. : alk. paper)
Lccn
2012933375
Specific material designation
remote
System control number
(WaSeSS)bookssj0000666034
Label
Data privacy management and autonomous spontaneus security : 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011 : revised selected papers, Joaquin Garcia-Alfaro ... [et al.] (eds.), (electronic resource)
Publication
Note
Title misspelled and should read: Data privacy management and autonomous spontaneous security
Bibliography note
Includes bibliographical references and index
Contents
  • On the Complexity of Aggregating Information for Authentication and Profiling
  • Christian A. Duncan and Vir V. Phoha
  • Secure and Privacy-Aware Searching in Peer-to-Peer Networks
  • Jaydip Sen
  • On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam
  • Inference-Proof View Update Transactions with Minimal Refusals
  • Joachim Biskup and Cornelia Tadros
  • Privacy Challenges in RFID
  • Gildas Avoine
  • Fake Injection Strategies for Private Phonetic Matching
  • Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen
  • A Design Phase for Data Sharing Agreements
  • Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand
  • A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
  • Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné
  • Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
  • Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al.
  • Risk-Based Auto-delegation for Probabilistic Availability
  • Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin
  • Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
  • Representation-Independent Data Usage Control
  • Alexander Pretschner, Enrico Lovat and Matthias Büchler
  • Using Personal Portfolios to Manage Customer Data
  • Aimilia Tasidou and Pavlos S. Efraimidis
  • Using Requirements Engineering in an Automatic Security Policy Derivation Process
  • Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al.
  • Web Services Verification and Prudent Implementation
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch
  • Yulong Fu and Ousmane Kone
  • A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring
  • Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris
  • Controlling Data Dissemination
  • Helge Janicke, Mohamed Sarrab and Hamza Aldabbas
  • A Framework of Deployment Strategy for Hierarchical WSN Security Management
  • Christine Hennebert and Vincent Berg
  • Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell
  • Distributed Orchestration of Web Services under Security Constraints
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani
  • On the Key Schedule Strength of PRESENT
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson
  • A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines
  • Enric Pujol-Gil and Nikolaos Chatzis
  • Network Securing against Threatening Requests
  • On the Complexity of Aggregating Information for Authentication and Profiling
  • Christian A. Duncan and Vir V. Phoha
  • Secure and Privacy-Aware Searching in Peer-to-Peer Networks
  • Jaydip Sen
  • On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol
  • Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam
  • Inference-Proof View Update Transactions with Minimal Refusals
  • Joachim Biskup and Cornelia Tadros
  • Privacy Challenges in RFID
  • Gildas Avoine
  • Fake Injection Strategies for Private Phonetic Matching
  • Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen
  • A Design Phase for Data Sharing Agreements
  • Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand
  • A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
  • Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné
  • Evolving Security Requirements in Multi-layered Service-Oriented-Architectures
  • Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al.
  • Risk-Based Auto-delegation for Probabilistic Availability
  • Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin
  • Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
  • Representation-Independent Data Usage Control
  • Alexander Pretschner, Enrico Lovat and Matthias Büchler
  • Using Personal Portfolios to Manage Customer Data
  • Aimilia Tasidou and Pavlos S. Efraimidis
  • Using Requirements Engineering in an Automatic Security Policy Derivation Process
  • Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al.
  • Web Services Verification and Prudent Implementation
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch
  • Yulong Fu and Ousmane Kone
  • A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring
  • Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris
  • Controlling Data Dissemination
  • Helge Janicke, Mohamed Sarrab and Hamza Aldabbas
  • A Framework of Deployment Strategy for Hierarchical WSN Security Management
  • Christine Hennebert and Vincent Berg
  • Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell
  • Distributed Orchestration of Web Services under Security Constraints
  • Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani
  • On the Key Schedule Strength of PRESENT
  • Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson
  • A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines
  • Enric Pujol-Gil and Nikolaos Chatzis
  • Network Securing against Threatening Requests
Control code
OCM1bookssj0000666034
Dimensions
unknown
Isbn
9783642288784
Isbn Type
(pbk. : alk. paper)
Lccn
2012933375
Specific material designation
remote
System control number
(WaSeSS)bookssj0000666034

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...