|
|
|
|
LEADER |
07946cam a22015972 4500 |
001 |
0-1651397155 |
003 |
DE-627 |
005 |
20240122105118.0 |
007 |
cr uuu---uuuuu |
008 |
120410s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642288791
|9 978-3-642-28879-1
|
024 |
7 |
|
|a 10.1007/978-3-642-28879-1
|2 doi
|
035 |
|
|
|a (DE-627)1651397155
|
035 |
|
|
|a (DE-576)363413340
|
035 |
|
|
|a (DE-599)BSZ363413340
|
035 |
|
|
|a (OCoLC)785706959
|
035 |
|
|
|a (OCoLC)785706959
|
035 |
|
|
|a (DE-He213)978-3-642-28879-1
|
035 |
|
|
|a (EBP)040541541
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.M3
|
072 |
|
7 |
|a UYZM
|2 bicssc
|
072 |
|
7 |
|a UKR
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a BUS083000
|2 bisacsh
|
072 |
|
7 |
|a KJQ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Garcia-Alfaro, Joaquin
|0 (DE-627)1388665042
|0 (DE-576)318665042
|4 aut
|
245 |
1 |
0 |
|a Data Privacy Management and Autonomous Spontaneus Security
|b 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers
|c edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2012
|
300 |
|
|
|a Online-Ressource (XV, 319p. 82 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7122
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Application software.
|
655 |
|
7 |
|a Konferenzschrift
|y 2011
|z Löwen
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4293034-0
|0 (DE-627)104199954
|0 (DE-576)210933003
|a Zugriffskontrolle
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4139375-2
|0 (DE-627)10477827X
|0 (DE-576)209693886
|a Anwendungssystem
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4691234-4
|0 (DE-627)35055126X
|0 (DE-576)215074130
|a Web Services
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4820003-7
|0 (DE-627)482247932
|0 (DE-576)21671561X
|a Autonomic Computing
|2 gnd
|
689 |
1 |
3 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
1 |
4 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
700 |
1 |
|
|a Navarro-Arribas, Guillermo
|0 (DE-588)1229005714
|0 (DE-627)1750933934
|4 oth
|
700 |
1 |
|
|a Cuppens-Boulahia, Nora
|4 oth
|
700 |
1 |
|
|a Capitani di Vimercati, Sabrina
|4 oth
|
776 |
1 |
|
|z 9783642288784
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Data privacy management and autonomous spontaneus security
|d Berlin : Springer, 2012
|h XV, 318 S.
|w (DE-627)687727286
|w (DE-576)366026062
|z 3642288782
|z 9783642288784
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7122
|9 7122
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-28879-1
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|x Verlag
|3 Volltext
|
856 |
4 |
2 |
|u http://d-nb.info/1019948183/04
|m B:DE-101
|q application/pdf
|v 2013-05-01
|x Verlag
|3 Inhaltsverzeichnis
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=3981595&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
889 |
|
|
|w (DE-627)71503961X
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Alfaro, Joaquin Garcia-
|
900 |
|
|
|a Navarro Arribas, Guillermo
|
900 |
|
|
|a Navarro, Guillermo
|
900 |
|
|
|a Arribas, Guillermo Navarro-
|
950 |
|
|
|a Access control
|
950 |
|
|
|a Zugangskontrolle
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Anwendungssoftware
|
950 |
|
|
|a Прикладная система
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Application Services
|
950 |
|
|
|a Web-Service
|
950 |
|
|
|a Dienstekomposition
|
950 |
|
|
|a Autonomes Computing
|
950 |
|
|
|a Autonomes System
|
950 |
|
|
|a Autonomes Rechnen
|
950 |
|
|
|a Organic Computing
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3347102681
|z 2012-04-10T09:47:27Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3347102754
|z 2012-04-10T09:47:27Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3347102789
|z 2012-04-10T09:47:27Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3347102827
|z 2012-11-10T04:19:51Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-28879-1
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3347102878
|z 2012-04-10T09:47:27Z
|
980 |
|
|
|a 1651397155
|b 0
|k 1651397155
|o 363413340
|
SOLR
_version_ |
1792253777497030656 |
access_facet |
Electronic Resources |
author |
Garcia-Alfaro, Joaquin |
author2 |
Navarro-Arribas, Guillermo, Cuppens-Boulahia, Nora, Capitani di Vimercati, Sabrina |
author2_role |
oth, oth, oth |
author2_variant |
g n a gna, n c b ncb, d v s c dvs dvsc |
author_facet |
Garcia-Alfaro, Joaquin, Navarro-Arribas, Guillermo, Cuppens-Boulahia, Nora, Capitani di Vimercati, Sabrina |
author_role |
aut |
author_sort |
Garcia-Alfaro, Joaquin |
author_variant |
j g a jga |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.M3 |
callnumber-search |
QA76.9.M3 |
callnumber-sort |
QA 276.9 M3 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration. |
ctrlnum |
(DE-627)1651397155, (DE-576)363413340, (DE-599)BSZ363413340, (OCoLC)785706959, (DE-He213)978-3-642-28879-1, (EBP)040541541 |
de15_date |
2012-04-10T09:47:27Z |
dech1_date |
2012-04-10T09:47:27Z |
doi_str_mv |
10.1007/978-3-642-28879-1 |
era_facet |
2011 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Web Services, Autonomic Computing, Computersicherheit |
finc_class_facet |
Informatik, Wirtschaftswissenschaften, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2011 Löwen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Löwen |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7122 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651397155 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651397155 |
is_hierarchy_title |
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers |
isbn |
9783642288791 |
isbn_isn_mv |
9783642288784, 3642288782 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651397155 |
language |
English |
last_indexed |
2024-02-29T17:06:33.905Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Operating systems (Computers), Data encryption (Computer science), Cryptography., Computers and civilization., Computer networks ., Electronic data processing, Application software., Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Web Services, Autonomic Computing, Computersicherheit |
marc024a_ct_mv |
10.1007/978-3-642-28879-1 |
match_str |
garciaalfaro2012dataprivacymanagementandautonomousspontaneussecurity6thinternationalworkshopdpm2011and4thinternationalworkshopsetop2011leuvenbelgiumseptember15162011revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7122 |
names_id_str_mv |
(DE-627)1388665042, (DE-576)318665042, (DE-588)1229005714, (DE-627)1750933934 |
oclc_num |
785706959 |
physical |
Online-Ressource (XV, 319p. 82 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
363413340 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3038691 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7122 |
series2 |
Lecture Notes in Computer Science ; 7122, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Garcia-Alfaro, Joaquin (DE-627)1388665042 (DE-576)318665042 aut, Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati, Berlin, Heidelberg Springer Berlin Heidelberg 2012, Online-Ressource (XV, 319p. 82 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7122, SpringerLink Bücher, Literaturangaben, This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration., Computer science, Computer Communication Networks, Information Systems, Computer Science, Operating systems (Computers), Data encryption (Computer science), Cryptography., Computers and civilization., Computer networks ., Electronic data processing, Application software., Konferenzschrift 2011 Löwen (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, DE-101, s (DE-588)4139375-2 (DE-627)10477827X (DE-576)209693886 Anwendungssystem gnd, s (DE-588)4691234-4 (DE-627)35055126X (DE-576)215074130 Web Services gnd, s (DE-588)4820003-7 (DE-627)482247932 (DE-576)21671561X Autonomic Computing gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, Navarro-Arribas, Guillermo (DE-588)1229005714 (DE-627)1750933934 oth, Cuppens-Boulahia, Nora oth, Capitani di Vimercati, Sabrina oth, 9783642288784, Buchausg. u.d.T. Data privacy management and autonomous spontaneus security Berlin : Springer, 2012 XV, 318 S. (DE-627)687727286 (DE-576)366026062 3642288782 9783642288784, Lecture notes in computer science 7122 7122 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-28879-1 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-28879-1 Verlag Volltext, http://d-nb.info/1019948183/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, http://deposit.d-nb.de/cgi-bin/dokserv?id=3981595&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, (DE-627)71503961X, http://dx.doi.org/10.1007/978-3-642-28879-1 DE-14, DE-14 epn:3347102681 2012-04-10T09:47:27Z, http://dx.doi.org/10.1007/978-3-642-28879-1 DE-15, DE-15 epn:3347102754 2012-04-10T09:47:27Z, http://dx.doi.org/10.1007/978-3-642-28879-1 DE-Ch1, DE-Ch1 epn:3347102789 2012-04-10T09:47:27Z, http://dx.doi.org/10.1007/978-3-642-28879-1 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3347102827 2012-11-10T04:19:51Z, http://dx.doi.org/10.1007/978-3-642-28879-1 DE-520, DE-520 epn:3347102878 2012-04-10T09:47:27Z |
spellingShingle |
Garcia-Alfaro, Joaquin, Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, Lecture notes in computer science, 7122, This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration., Computer science, Computer Communication Networks, Information Systems, Computer Science, Operating systems (Computers), Data encryption (Computer science), Cryptography., Computers and civilization., Computer networks ., Electronic data processing, Application software., Konferenzschrift 2011 Löwen, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Web Services, Autonomic Computing, Computersicherheit |
swb_id_str |
363413340 |
title |
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers |
title_auth |
Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers |
title_full |
Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati |
title_fullStr |
Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati |
title_full_unstemmed |
Data Privacy Management and Autonomous Spontaneus Security 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina Capitani di Vimercati |
title_in_hierarchy |
7122. Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers (2012) |
title_short |
Data Privacy Management and Autonomous Spontaneus Security |
title_sort |
data privacy management and autonomous spontaneus security 6th international workshop dpm 2011 and 4th international workshop setop 2011 leuven belgium september 15 16 2011 revised selected papers |
title_sub |
6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers |
title_unstemmed |
Data Privacy Management and Autonomous Spontaneus Security: 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Operating systems (Computers), Data encryption (Computer science), Cryptography., Computers and civilization., Computer networks ., Electronic data processing, Application software., Konferenzschrift 2011 Löwen, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Web Services, Autonomic Computing, Computersicherheit |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Operating systems (Computers), Data encryption (Computer science), Cryptography., Computers and civilization., Computer networks ., Electronic data processing, Application software., Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Web Services, Autonomic Computing, Computersicherheit |
url |
https://doi.org/10.1007/978-3-642-28879-1, http://dx.doi.org/10.1007/978-3-642-28879-1, http://d-nb.info/1019948183/04, http://deposit.d-nb.de/cgi-bin/dokserv?id=3981595&prov=M&dok_var=1&dok_ext=htm |