Editors:
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8247)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): DPM: International Workshop on Data Privacy Management, SETOP: International Workshop on Autonomous and Spontaneous Security
Conference proceedings info: DPM 2013, SETOP 2013.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (26 papers)
-
Front Matter
-
Keynote Address
-
Front Matter
-
-
Data Privacy Management
-
Front Matter
-
-
Autonomous and Spontaneous Security
-
Front Matter
-
About this book
Editors and Affiliations
-
TELECOM SudParis, Evry, France
Joaquin Garcia-Alfaro
-
National Technical University of Athens, Athens, Greece
Georgios Lioudakis
-
TELECOM Bretagne, Cesson Sévigné, France
Nora Cuppens-Boulahia
-
University College Cork, Cork, Ireland
Simon Foley
-
IDA Ovens, EMC Information Systems International, Cork, Ireland
William M. Fitzgerald
Bibliographic Information
Book Title: Data Privacy Management and Autonomous Spontaneous Security
Book Subtitle: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers
Editors: Joaquin Garcia-Alfaro, Georgios Lioudakis, Nora Cuppens-Boulahia, Simon Foley, William M. Fitzgerald
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-54568-9
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2014
Softcover ISBN: 978-3-642-54567-2Published: 02 April 2014
eBook ISBN: 978-3-642-54568-9Published: 20 March 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVII, 400
Number of Illustrations: 105 b/w illustrations
Topics: Systems and Data Security, Management of Computing and Information Systems, Cryptology