Skip to main content
Book cover

Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers

  • Conference proceedings
  • © 2011

Overview

  • High quality selected papers
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6514)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: DPM 2010, SETOP 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (18 papers)

  1. Keynote Talks

  2. Data Privacy Management

  3. Autonomous and Spontaneous Security

Other volumes

  1. Data Privacy Management and Autonomous Spontaneous Security

Keywords

About this book

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 5th International Workshop on Data Privacy Management, DPM 2010, and the 3rd International Workshop on Autonomous and Spontaneous Security, SETOP 2010, collocated with the ESORICS 2010 symposium in Athens, Greece, in September 2010. The 9 revised full papers for DPM 2010 presented together with two keynote talks are accompanied by 7 revised full papers of SETOP 2010; all papers were carefully reviewed and selected for inclusion in the book. The DPM 2010 papers cover topics such as how to translate the high-level business goals into system-level privacy policies, administration of privacy-sensitive data, privacy data integration and engineering, privacy access control mechanisms, information-oriented security, and query execution on privacy-sensitive data for partial answers. The SETOP 2010 papers address several specific aspects of the previously cited topics, as for instance the autonomic administration of security policies, secure P2P storage, RFID authentication, anonymity in reputation systems, etc.

Editors and Affiliations

  • IT/TELECOM Bretagne, Campus de Rennes, Cesson Sévigné, Cedex, France

    Joaquin Garcia-Alfaro

  • IIIA-CSIC, Campus UAB, Bellaterra, Spain

    Guillermo Navarro-Arribas

  • IT/TELECOM SudParis, Evry Cedex, France

    Ana Cavalli

  • IT/TELECOM ParisTech, Paris Cedex 13, France

    Jean Leneutre

Bibliographic Information

Publish with us