Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7731 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7731.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Data Privacy Management -- Fair Anonymous Authentication for Location Based Services / Panayiotis Kotzanikolaou, Emmanouil Magkos, Nikolaos Petrakos, Christos Douligeris -- Enhancing Privacy in LTE Paging System Using Physical Layer Identification / Tuan Ta, John S. Baras -- Post-hoc User Traceability Analysis in Electronic Toll Pricing Systems / Xihui Chen, David Fonkwe, Jun Pang -- An Efficient and Secure Coding-Based Authenticated Encryption Scheme / Mohammed Meziani, Rachid El Bansarkhani -- Proposal of Non-invasive Fingerprint Age Determination to Improve Data Privacy Management in Police Work from a Legal Perspective Using the Example of Germany / Ronny Merkel, Matthias Pocs, Jana Dittmann, Claus Vielhauer -- Differential Privacy in Tripartite Interaction: A Case Study with Linguistic Minorities in Canada / Arnaud Casteigts, Marie-Hélène Chomienne, Louise Bouchard, Guy-Vincent Jourdan -- EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity / Carlo Blundo, Emiliano De Cristofaro, Paolo Gasti |
|
SlopPy: Slope One with Privacy / Sébastien Gambs, Julien Lolive -- A Semi-lattice Model for Multi-lateral Security / Florian Kammüller -- Prioritized Execution of Privacy Policies / Ilaria Matteucci, Paolo Mori, Marinella Petrocchi -- What Websites Know About You / Elisa Costante, Jerry den Hartog, Milan Petković -- Automating Privacy Enforcement in Cloud Platforms / Peng Yu, Jakub Sendor, Gabriel Serme, Anderson Santana de Oliveira -- Evaluation of Jif and Joana as Information Flow Analyzers in a Model-Driven Approach / Kuzman Katkalov, Peter Fischer, Kurt Stenzel, Nina Moebius, Wolfgang Reif -- Autonomous and Spontaneous Security -- Analyzing HTTP User Agent Anomalies for Malware Detection / Nizar Kheir -- AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing / Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei |
Summary |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information storage and retrieval systems |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
e-Commerce/e-business |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
elektronische handel |
|
electronic commerce |
|
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Di Pietro, Roberto (Computer scientist)
|
|
SETOP (Workshop) (5th : 2012 : Pisa, Italy)
|
ISBN |
9783642358906 |
|
364235890X |
|
3642358896 |
|
9783642358890 |
|