Skip to main content
  • Conference proceedings
  • © 2011

Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers

  • High quality selected papers
  • Unique visibility
  • State of the art research

Conference proceedings info: DPM 2010, SETOP 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Keynote Talks

    1. Privacy in Data Publishing

      • Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga
      Pages 8-21
  3. Data Privacy Management

    1. A User-Oriented Anonymization Mechanism for Public Data

      • Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 22-35
    2. FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa

      • Hessam Zakerzadeh, Sylvia L. Osborn
      Pages 36-50
    3. Non-uniform Stepping Approach to RFID Distance Bounding Problem

      • Ali Özhan Gürel, Atakan Arslan, Mete Akgün
      Pages 64-78
    4. E-Ticketing Scheme for Mobile Devices with Exculpability

      • Arnau Vives-Guasch, Magdalena Payeras-Capella, Macià Mut-Puigserver, Jordi Castellà-Roca
      Pages 79-92
    5. L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols

      • Almudena Alcaide, Ali E. Abdallah, Ana I. González–Tablas, José M. de Fuentes
      Pages 108-122
    6. Surveillance, Privacy and the Law of Requisite Variety

      • Vasilios Katos, Frank Stowell, Peter Bednar
      Pages 123-139
    7. A Notation for Policies Using Feature Structures

      • Kunihiko Fujita, Yasuyuki Tsukada
      Pages 140-154
  4. Autonomous and Spontaneous Security

    1. Securing P2P Storage with a Self-organizing Payment Scheme

      • Nouha Oualha, Yves Roudier
      Pages 155-169
    2. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

      • Wendy Maiden, Ioanna Dionysiou, Deborah Frincke, Glenn Fink, David E. Bakken
      Pages 188-202
    3. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

      • Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Stere Preda
      Pages 203-215
    4. A DSL for Specifying Autonomic Security Management Strategies

      • Ruan He, Marc Lacoste, Jacques Pulou, Jean Leneutre
      Pages 216-230
    5. Secure and Scalable RFID Authentication Protocol

      • Albert Fernàndez-Mir, Jordi Castellà-Roca, Alexandre Viejo
      Pages 231-243
    6. Some Ideas on Virtualized System Security, and Monitors

      • Hedi Benzina, Jean Goubault-Larrecq
      Pages 244-258
  5. Back Matter

Other Volumes

  1. Data Privacy Management and Autonomous Spontaneous Security

About this book

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

Editors and Affiliations

  • IT/TELECOM Bretagne, Campus de Rennes, Cesson Sévigné, Cedex, France

    Joaquin Garcia-Alfaro

  • IIIA-CSIC, Campus UAB, Bellaterra, Spain

    Guillermo Navarro-Arribas

  • IT/TELECOM SudParis, Evry Cedex, France

    Ana Cavalli

  • IT/TELECOM ParisTech, Paris Cedex 13, France

    Jean Leneutre

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access