|
|
|
|
LEADER |
08107cam a22015012 4500 |
001 |
0-1652026606 |
003 |
DE-627 |
005 |
20240122104955.0 |
007 |
cr uuu---uuuuu |
008 |
130207s2013 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642358906
|9 978-3-642-35890-6
|
024 |
7 |
|
|a 10.1007/978-3-642-35890-6
|2 doi
|
035 |
|
|
|a (DE-627)1652026606
|
035 |
|
|
|a (DE-576)378522310
|
035 |
|
|
|a (DE-599)BSZ378522310
|
035 |
|
|
|a (OCoLC)830902072
|
035 |
|
|
|a (DE-He213)978-3-642-35890-6
|
035 |
|
|
|a (EBP)040546780
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Pietro, Roberto
|4 aut
|
245 |
1 |
0 |
|a Data Privacy Management and Autonomous Spontaneous Security
|b 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
|c edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2013
|
300 |
|
|
|a Online-Ressource (XIV, 333 p. 100 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7731
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
505 |
8 |
0 |
|a Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management.
|
520 |
|
|
|a This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information storage and retrieval systems
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information storage and retrieval systems
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Electronic commerce.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Pisa
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
655 |
|
7 |
|a Konferenzschrift
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4293034-0
|0 (DE-627)104199954
|0 (DE-576)210933003
|a Zugriffskontrolle
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4139375-2
|0 (DE-627)10477827X
|0 (DE-576)209693886
|a Anwendungssystem
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4820003-7
|0 (DE-627)482247932
|0 (DE-576)21671561X
|a Autonomic Computing
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
1 |
3 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
700 |
1 |
|
|a Herranz, Javier
|4 oth
|
700 |
1 |
|
|a Damiani, Ernesto
|0 (DE-627)1237752345
|0 (DE-576)167752340
|4 oth
|
700 |
1 |
|
|a State, Radu
|4 oth
|
776 |
1 |
|
|z 9783642358890
|
776 |
0 |
8 |
|i Erscheint auch als
|n Druck-Ausgabe
|t Data privacy management and autonomous spontaneous security
|d Berlin : Springer, 2013
|h XIV, 331 S.
|w (DE-627)731907647
|w (DE-576)382314069
|z 3642358896
|z 9783642358890
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7731
|9 7731
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-35890-6
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz378522310cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130402155131
|3 Cover
|
889 |
|
|
|w (DE-627)735260818
|
912 |
|
|
|a ZDB-2-LNC
|b 2013
|
912 |
|
|
|a ZDB-2-SCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2013
|
912 |
|
|
|a ZDB-2-SEB
|b 2013
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Damiani, E.
|
950 |
|
|
|a Access control
|
950 |
|
|
|a Zugangskontrolle
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Anwendungssoftware
|
950 |
|
|
|a Прикладная система
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Autonomes Computing
|
950 |
|
|
|a Autonomes System
|
950 |
|
|
|a Autonomes Rechnen
|
950 |
|
|
|a Organic Computing
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3356093908
|z 2013-02-07T10:39:56Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3356093967
|z 2013-02-07T10:39:56Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3356094017
|z 2013-02-07T10:39:56Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3356094076
|z 2013-02-07T10:39:56Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-35890-6
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3356094122
|z 2013-02-07T10:39:56Z
|
980 |
|
|
|a 1652026606
|b 0
|k 1652026606
|o 378522310
|
SOLR
_version_ |
1792258590898126848 |
access_facet |
Electronic Resources |
author |
Pietro, Roberto |
author2 |
Herranz, Javier, Damiani, Ernesto, State, Radu |
author2_role |
oth, oth, oth |
author2_variant |
j h jh, e d ed, r s rs |
author_facet |
Pietro, Roberto, Herranz, Javier, Damiani, Ernesto, State, Radu |
author_role |
aut |
author_sort |
Pietro, Roberto |
author_variant |
r p rp |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management |
ctrlnum |
(DE-627)1652026606, (DE-576)378522310, (DE-599)BSZ378522310, (OCoLC)830902072, (DE-He213)978-3-642-35890-6, (EBP)040546780 |
de15_date |
2013-02-07T10:39:56Z |
dech1_date |
2013-02-07T10:39:56Z |
doi_str_mv |
10.1007/978-3-642-35890-6 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit |
finc_class_facet |
Informatik, Mathematik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Pisa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Pisa |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7731 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1652026606 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2013 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2013 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1652026606 |
is_hierarchy_title |
Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers |
isbn |
9783642358906 |
isbn_isn_mv |
9783642358890, 3642358896 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1652026606 |
language |
English |
last_indexed |
2024-02-29T18:23:05.59Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit |
marc024a_ct_mv |
10.1007/978-3-642-35890-6 |
match_str |
pietro2013dataprivacymanagementandautonomousspontaneoussecurity7thinternationalworkshopdpm2012and5thinternationalworkshopsetop2012pisaitalyseptember13142012revisedselectedpapers |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7731 |
names_id_str_mv |
(DE-627)1237752345, (DE-576)167752340 |
oclc_num |
830902072 |
physical |
Online-Ressource (XIV, 333 p. 100 illus, digital) |
publishDate |
2013 |
publishDateSort |
2013 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
378522310 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3198466 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7731 |
series2 |
Lecture Notes in Computer Science ; 7731, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Pietro, Roberto aut, Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 333 p. 100 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7731, SpringerLink Bücher, Literaturangaben, Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, DE-101, s (DE-588)4139375-2 (DE-627)10477827X (DE-576)209693886 Anwendungssystem gnd, s (DE-588)4820003-7 (DE-627)482247932 (DE-576)21671561X Autonomic Computing gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, Herranz, Javier oth, Damiani, Ernesto (DE-627)1237752345 (DE-576)167752340 oth, State, Radu oth, 9783642358890, Erscheint auch als Druck-Ausgabe Data privacy management and autonomous spontaneous security Berlin : Springer, 2013 XIV, 331 S. (DE-627)731907647 (DE-576)382314069 3642358896 9783642358890, Lecture notes in computer science 7731 7731 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-35890-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-35890-6 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz378522310cov.jpg V:DE-576 X:springer image/jpeg 20130402155131 Cover, (DE-627)735260818, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-14, DE-14 epn:3356093908 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-15, DE-15 epn:3356093967 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-Ch1, DE-Ch1 epn:3356094017 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3356094076 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-520, DE-520 epn:3356094122 2013-02-07T10:39:56Z |
spellingShingle |
Pietro, Roberto, Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers, Lecture notes in computer science, 7731, Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa, Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit |
swb_id_str |
378522310 |
title |
Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers |
title_auth |
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers |
title_full |
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State |
title_fullStr |
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State |
title_full_unstemmed |
Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State |
title_in_hierarchy |
7731. Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (2013) |
title_short |
Data Privacy Management and Autonomous Spontaneous Security |
title_sort |
data privacy management and autonomous spontaneous security 7th international workshop dpm 2012 and 5th international workshop setop 2012 pisa italy september 13 14 2012 revised selected papers |
title_sub |
7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers |
title_unstemmed |
Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers |
topic |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa, Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit |
topic_facet |
Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit |
url |
https://doi.org/10.1007/978-3-642-35890-6, http://dx.doi.org/10.1007/978-3-642-35890-6, https://swbplus.bsz-bw.de/bsz378522310cov.jpg |