did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642112065

Data Privacy Management and Autonomous Spontaneous Security: 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009 Revised Selected Papers

by ; ; ;
  • ISBN13:

    9783642112065

  • ISBN10:

    3642112064

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2010-02-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00

Summary

This book constitutes the thoroughly refereed post-conference proceedings of the two international workshops DPM 2009, the 4th International Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009.The 8 revised full papers for DPM 2009, selected from 23 submissions, presented together with two keynote lectures are accompanied by 9 revised full papers of SETOP 2009; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2009 papers cover topics such as privacy in service oriented architectures, privacy-preserving mechanisms, crossmatching and indistinguishability techniques, privacy policies, and disclosure of information. The SETOP 2009 papers address all current issues within the sope of security policies, identification and privacy, as well as security mechanisms.

Table of Contents

Keynote Talks
The UNESCO Chair in Data Privacy Research in Vehicular Networksp. 1
Privacy Management for Global Organizationsp. 9
Data Privacy Management
Obligation Language and Framework to Enable Privacy-Aware SOAp. 18
Distributed Privacy-Preserving Methods for Statistical Disclosure Controlp. 33
Towards a Privacy-Preserving National Identity Cardp. 48
Using SAT-Solvers to Compute Inference-Proof Database Instancesp. 65
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystemp. 78
A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Searchp. 93
Visualizing Privacy Implications of Access Control Policies in Social Network Systemsp. 106
Contextual Privacy Management in Extended Role Based Access Control Modelp. 121
Autonomous and Spontaneous Security
Dynamic Security Rules for Geo Datap. 136
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarkingp. 153
ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)p. 163
Untraceable Tags Based on Mild Assumptionsp. 178
Security Threat Mitigation Trends in Low-Cost RFID Systemsp. 193
An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classificationp. 208
DDoS Defense Mechanisms: A New Taxonomyp. 222
RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systemsp. 237
Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challengesp. 253
About Indexp. 269
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program