Eintrag weiter verarbeiten

Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. R...

Gespeichert in:

Personen und Körperschaften: Pietro, Roberto (VerfasserIn), Herranz, Javier (Sonstige), Damiani, Ernesto (Sonstige), State, Radu (Sonstige)
Titel: Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers/ edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2013
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7731
Schlagwörter:
Verfügbar auch als: Druck-Ausgabe Data privacy management and autonomous spontaneous security, Berlin : Springer, 2013, XIV, 331 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 08107cam a22015012 4500
001 0-1652026606
003 DE-627
005 20240122104955.0
007 cr uuu---uuuuu
008 130207s2013 gw |||||o 00| ||eng c
020 |a 9783642358906  |9 978-3-642-35890-6 
024 7 |a 10.1007/978-3-642-35890-6  |2 doi 
035 |a (DE-627)1652026606 
035 |a (DE-576)378522310 
035 |a (DE-599)BSZ378522310 
035 |a (OCoLC)830902072 
035 |a (DE-He213)978-3-642-35890-6 
035 |a (EBP)040546780 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a 54.38  |2 bkl 
100 1 |a Pietro, Roberto  |4 aut 
245 1 0 |a Data Privacy Management and Autonomous Spontaneous Security  |b 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers  |c edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2013 
300 |a Online-Ressource (XIV, 333 p. 100 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7731 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
505 8 0 |a Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management. 
520 |a This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Information storage and retrieval systems 
650 0 |a Information Systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Information storage and retrieval systems 
650 0 |a Electronic data processing 
650 0 |a Electronic commerce. 
650 0 |a Computer networks . 
650 0 |a Cryptography. 
655 7 |a Konferenzschrift  |y 2012  |z Pisa  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
655 7 |a Konferenzschrift  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 1 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 0 2 |D s  |0 (DE-588)4293034-0  |0 (DE-627)104199954  |0 (DE-576)210933003  |a Zugriffskontrolle  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4139375-2  |0 (DE-627)10477827X  |0 (DE-576)209693886  |a Anwendungssystem  |2 gnd 
689 1 1 |D s  |0 (DE-588)4820003-7  |0 (DE-627)482247932  |0 (DE-576)21671561X  |a Autonomic Computing  |2 gnd 
689 1 2 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 1 3 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 1 |5 DE-101 
700 1 |a Herranz, Javier  |4 oth 
700 1 |a Damiani, Ernesto  |0 (DE-627)1237752345  |0 (DE-576)167752340  |4 oth 
700 1 |a State, Radu  |4 oth 
776 1 |z 9783642358890 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |t Data privacy management and autonomous spontaneous security  |d Berlin : Springer, 2013  |h XIV, 331 S.  |w (DE-627)731907647  |w (DE-576)382314069  |z 3642358896  |z 9783642358890 
830 0 |a Lecture notes in computer science  |v 7731  |9 7731  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-35890-6  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz378522310cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20130402155131  |3 Cover 
889 |w (DE-627)735260818 
912 |a ZDB-2-LNC  |b 2013 
912 |a ZDB-2-SCS  |b 2013 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2013 
912 |a ZDB-2-SEB  |b 2013 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
900 |a Damiani, E. 
950 |a Access control 
950 |a Zugangskontrolle 
950 |a Computersicherheit 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Anwendungssoftware 
950 |a Прикладная система 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Datensicherheit 
950 |a Datenverarbeitung 
950 |a Надёжность сохранения данных 
950 |a Autonomes Computing 
950 |a Autonomes System 
950 |a Autonomes Rechnen 
950 |a Organic Computing 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |9 DE-14 
852 |a DE-14  |x epn:3356093908  |z 2013-02-07T10:39:56Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |9 DE-15 
852 |a DE-15  |x epn:3356093967  |z 2013-02-07T10:39:56Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3356094017  |z 2013-02-07T10:39:56Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3356094076  |z 2013-02-07T10:39:56Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-35890-6  |9 DE-520 
852 |a DE-520  |x epn:3356094122  |z 2013-02-07T10:39:56Z 
980 |a 1652026606  |b 0  |k 1652026606  |o 378522310 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Data+Privacy+Management+and+Autonomous+Spontaneous+Security%3A+7th+International+Workshop%2C+DPM+2012%2C+and+5th+International+Workshop%2C+SETOP+2012%2C+Pisa%2C+Italy%2C+September+13-14%2C+2012.+Revised+Selected+Papers&rft.date=2013&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Data+Privacy+Management+and+Autonomous+Spontaneous+Security%3A+7th+International+Workshop%2C+DPM+2012%2C+and+5th+International+Workshop%2C+SETOP+2012%2C+Pisa%2C+Italy%2C+September+13-14%2C+2012.+Revised+Selected+Papers&rft.series=Lecture+notes+in+computer+science%2C+7731&rft.au=Pietro%2C+Roberto&rft.pub=Springer&rft.edition=&rft.isbn=364235890X
SOLR
_version_ 1792258590898126848
access_facet Electronic Resources
author Pietro, Roberto
author2 Herranz, Javier, Damiani, Ernesto, State, Radu
author2_role oth, oth, oth
author2_variant j h jh, e d ed, r s rs
author_facet Pietro, Roberto, Herranz, Javier, Damiani, Ernesto, State, Radu
author_role aut
author_sort Pietro, Roberto
author_variant r p rp
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management
ctrlnum (DE-627)1652026606, (DE-576)378522310, (DE-599)BSZ378522310, (OCoLC)830902072, (DE-He213)978-3-642-35890-6, (EBP)040546780
de15_date 2013-02-07T10:39:56Z
dech1_date 2013-02-07T10:39:56Z
doi_str_mv 10.1007/978-3-642-35890-6
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit
finc_class_facet Informatik, Mathematik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Pisa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Pisa
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7731
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1652026606
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2013
imprint_str_mv Berlin, Heidelberg: Springer, 2013
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1652026606
is_hierarchy_title Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
isbn 9783642358906
isbn_isn_mv 9783642358890, 3642358896
issn_isn_mv 1611-3349
kxp_id_str 1652026606
language English
last_indexed 2024-02-29T18:23:05.59Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit
marc024a_ct_mv 10.1007/978-3-642-35890-6
match_str pietro2013dataprivacymanagementandautonomousspontaneoussecurity7thinternationalworkshopdpm2012and5thinternationalworkshopsetop2012pisaitalyseptember13142012revisedselectedpapers
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7731
names_id_str_mv (DE-627)1237752345, (DE-576)167752340
oclc_num 830902072
physical Online-Ressource (XIV, 333 p. 100 illus, digital)
publishDate 2013
publishDateSort 2013
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 378522310
recordtype marcfinc
rsn_id_str_mv (DE-15)3198466
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7731
series2 Lecture Notes in Computer Science ; 7731, SpringerLink ; Bücher
source_id 0
spelling Pietro, Roberto aut, Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State, Berlin, Heidelberg Springer 2013, Online-Ressource (XIV, 333 p. 100 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7731, SpringerLink Bücher, Literaturangaben, Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, Konferenzschrift (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4293034-0 (DE-627)104199954 (DE-576)210933003 Zugriffskontrolle gnd, DE-101, s (DE-588)4139375-2 (DE-627)10477827X (DE-576)209693886 Anwendungssystem gnd, s (DE-588)4820003-7 (DE-627)482247932 (DE-576)21671561X Autonomic Computing gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, Herranz, Javier oth, Damiani, Ernesto (DE-627)1237752345 (DE-576)167752340 oth, State, Radu oth, 9783642358890, Erscheint auch als Druck-Ausgabe Data privacy management and autonomous spontaneous security Berlin : Springer, 2013 XIV, 331 S. (DE-627)731907647 (DE-576)382314069 3642358896 9783642358890, Lecture notes in computer science 7731 7731 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-35890-6 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-35890-6 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz378522310cov.jpg V:DE-576 X:springer image/jpeg 20130402155131 Cover, (DE-627)735260818, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-14, DE-14 epn:3356093908 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-15, DE-15 epn:3356093967 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-Ch1, DE-Ch1 epn:3356094017 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3356094076 2013-02-07T10:39:56Z, http://dx.doi.org/10.1007/978-3-642-35890-6 DE-520, DE-520 epn:3356094122 2013-02-07T10:39:56Z
spellingShingle Pietro, Roberto, Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers, Lecture notes in computer science, 7731, Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management., This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management, Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa, Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit
swb_id_str 378522310
title Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
title_auth Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
title_full Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State
title_fullStr Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State
title_full_unstemmed Data Privacy Management and Autonomous Spontaneous Security 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers edited by Roberto Pietro, Javier Herranz, Ernesto Damiani, Radu State
title_in_hierarchy 7731. Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers (2013)
title_short Data Privacy Management and Autonomous Spontaneous Security
title_sort data privacy management and autonomous spontaneous security 7th international workshop dpm 2012 and 5th international workshop setop 2012 pisa italy september 13 14 2012 revised selected papers
title_sub 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
title_unstemmed Data Privacy Management and Autonomous Spontaneous Security: 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers
topic Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift 2012 Pisa, Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit
topic_facet Computer science, Computer Communication Networks, Information Systems, Computer Science, Data protection, Data encryption (Computer science), Information storage and retrieval systems, Electronic data processing, Electronic commerce., Computer networks ., Cryptography., Konferenzschrift, Datensicherung, Privatsphäre, Zugriffskontrolle, Anwendungssystem, Autonomic Computing, Computersicherheit
url https://doi.org/10.1007/978-3-642-35890-6, http://dx.doi.org/10.1007/978-3-642-35890-6, https://swbplus.bsz-bw.de/bsz378522310cov.jpg