Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

ISBN: 978-3-642-19347-7 (Print) 978-3-642-19348-4 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. Keynote Talks

    1. No Access

      Book Chapter

      Pages 1-7

      Towards Knowledge Intensive Data Privacy

    2. No Access

      Book Chapter

      Pages 8-21

      Privacy in Data Publishing

  3. Data Privacy Management

    1. No Access

      Book Chapter

      Pages 22-35

      A User-Oriented Anonymization Mechanism for Public Data

    2. No Access

      Book Chapter

      Pages 36-50

      FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa

    3. No Access

      Book Chapter

      Pages 51-63

      Secret-Sharing Hardware Improves the Privacy of Network Monitoring

    4. No Access

      Book Chapter

      Pages 64-78

      Non-uniform Stepping Approach to RFID Distance Bounding Problem

    5. No Access

      Book Chapter

      Pages 79-92

      E-Ticketing Scheme for Mobile Devices with Exculpability

    6. No Access

      Book Chapter

      Pages 93-107

      Privacy Enforcement and Analysis for Functional Active Objects

    7. No Access

      Book Chapter

      Pages 108-122

      L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols

    8. No Access

      Book Chapter

      Pages 123-139

      Surveillance, Privacy and the Law of Requisite Variety

    9. No Access

      Book Chapter

      Pages 140-154

      A Notation for Policies Using Feature Structures

  4. Autonomous and Spontaneous Security

    1. No Access

      Book Chapter

      Pages 155-169

      Securing P2P Storage with a Self-organizing Payment Scheme

    2. No Access

      Book Chapter

      Pages 170-187

      STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems

    3. No Access

      Book Chapter

      Pages 188-202

      DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    4. No Access

      Book Chapter

      Pages 203-215

      MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    5. No Access

      Book Chapter

      Pages 216-230

      A DSL for Specifying Autonomic Security Management Strategies

    6. No Access

      Book Chapter

      Pages 231-243

      Secure and Scalable RFID Authentication Protocol

    7. No Access

      Book Chapter

      Pages 244-258

      Some Ideas on Virtualized System Security, and Monitors

  5. Back Matter

    Pages -