000 | 04021nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-3-319-47072-6 | ||
003 | DE-He213 | ||
005 | 20240730183257.0 | ||
007 | cr nn 008mamaa | ||
008 | 160921s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319470726 _9978-3-319-47072-6 |
||
024 | 7 |
_a10.1007/978-3-319-47072-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData Privacy Management and Security Assurance _h[electronic resource] : _b11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings / _cedited by Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXIV, 247 p. 74 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9963 |
|
505 | 0 | _aManagement of privacy-sensitive informations -- Translation of high-level business goals into system-level privacy policies -- Administration of sensitive identifiers -- Data integration and privacy engineering.-Service oriented architectures -- Aspects of dependability, privacy, risk and trust. . | |
520 | _aThis book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. . | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9131290 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aApplication software. _9131291 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9131292 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aLivraga, Giovanni. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9131293 |
|
700 | 1 |
_aTorra, Vicenç. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9131294 |
|
700 | 1 |
_aAldini, Alessandro. _eeditor. _0(orcid) _10000-0002-7250-5011 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9131295 |
|
700 | 1 |
_aMartinelli, Fabio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9131296 |
|
700 | 1 |
_aSuri, Neeraj. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9131297 |
|
710 | 2 |
_aSpringerLink (Online service) _9131298 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319470719 |
776 | 0 | 8 |
_iPrinted edition: _z9783319470733 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9963 _9131299 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-47072-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91775 _d91775 |