|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-47072-6 |
003 |
DE-He213 |
005 |
20220115091709.0 |
007 |
cr nn 008mamaa |
008 |
160921s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319470726
|9 978-3-319-47072-6
|
024 |
7 |
|
|a 10.1007/978-3-319-47072-6
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Data Privacy Management and Security Assurance
|h [electronic resource] :
|b 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings /
|c edited by Giovanni Livraga, Vicenç Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a XIV, 247 p. 74 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9963
|
505 |
0 |
|
|a Management of privacy-sensitive informations -- Translation of high-level business goals into system-level privacy policies -- Administration of sensitive identifiers -- Data integration and privacy engineering.-Service oriented architectures -- Aspects of dependability, privacy, risk and trust. .
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Livraga, Giovanni.
|e editor.
|0 (orcid)0000-0003-2661-8573
|1 https://orcid.org/0000-0003-2661-8573
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Torra, Vicenç.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Aldini, Alessandro.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Martinelli, Fabio.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Suri, Neeraj.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319470719
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319470733
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9963
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-47072-6
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|