Description |
1 online resource (xv, 318 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7122 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7122.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros -- Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme / Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg |
Summary |
Annotation This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 6th International Workshop on Data Privacy Management, DPM 2011, and the 4th International Workshop on Autonomous and Spontaneous Security, SETOP 2011, held in Leuven, Belgium, in September 2011. The volume contains 9 full papers and 1 short paper from the DPM workshop and 9 full papers and 2 short papers from the SETOP workshop, as well as the keynote paper. The contributions from DPM cover topics from location privacy, privacy-based metering and billing, record linkage, policy-based privacy, application of data privacy in recommendation systems, privacy considerations in user profiles, in RFID, in network monitoring, in transactions protocols, in usage control, and in customer data. The topics of the SETOP contributions are access control, policy derivation, requirements engineering, verification of service-oriented-architectures, query and data privacy, policy delegation and service orchestration |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Operating systems (Computers) |
|
Data encryption (Computer science) |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Computers and Society |
|
Operating Systems |
Bibliography |
Includes bibliographical references and author index |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Data protection -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Operating systems (Computers)
|
|
Electronic Data Processing
|
|
data processing.
|
|
computer science.
|
|
operating systems.
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Data protection
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Garcia-Alfaro, Joaquin.
|
|
SETOP (Workshop) (4th : 2011 : Louvain, Belgium)
|
ISBN |
9783642288791 |
|
3642288790 |
|
3642288782 |
|
9783642288784 |
|