Data Privacy Management and Autonomous Spontaneous Security

4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers

ISBN: 978-3-642-11206-5 (Print) 978-3-642-11207-2 (Online)

Table of contents (19 chapters)

  1. Front Matter

    Pages -

  2. Keynote Talks

    1. No Access

      Book Chapter

      Pages 1-8

      The UNESCO Chair in Data Privacy Research in Vehicular Networks

    2. No Access

      Book Chapter

      Pages 9-17

      Privacy Management for Global Organizations

  3. Data Privacy Management

    1. No Access

      Book Chapter

      Pages 18-32

      Obligation Language and Framework to Enable Privacy-Aware SOA

    2. No Access

      Book Chapter

      Pages 33-47

      Distributed Privacy-Preserving Methods for Statistical Disclosure Control

    3. No Access

      Book Chapter

      Pages 48-64

      Towards a Privacy-Preserving National Identity Card

    4. No Access

      Book Chapter

      Pages 65-77

      Using SAT-Solvers to Compute Inference-Proof Database Instances

    5. No Access

      Book Chapter

      Pages 78-92

      A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem

    6. No Access

      Book Chapter

      Pages 93-105

      A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search

    7. No Access

      Book Chapter

      Pages 106-120

      Visualizing Privacy Implications of Access Control Policies in Social Network Systems

    8. No Access

      Book Chapter

      Pages 121-135

      Contextual Privacy Management in Extended Role Based Access Control Model

  4. Autonomous and Spontaneous Security

    1. No Access

      Book Chapter

      Pages 136-152

      Dynamic Security Rules for Geo Data

    2. No Access

      Book Chapter

      Pages 153-162

      Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    3. No Access

      Book Chapter

      Pages 163-177

      ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets)

    4. No Access

      Book Chapter

      Pages 178-192

      Untraceable Tags Based on Mild Assumptions

    5. No Access

      Book Chapter

      Pages 193-207

      Security Threat Mitigation Trends in Low-Cost RFID Systems

    6. No Access

      Book Chapter

      Pages 208-221

      An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification

    7. No Access

      Book Chapter

      Pages 222-236

      DDoS Defense Mechanisms: A New Taxonomy

    8. No Access

      Book Chapter

      Pages 237-252

      RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems

    9. No Access

      Book Chapter

      Pages 253-267

      Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges

  5. Back Matter

    Pages -