Book Volume 6514 2011

Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

ISBN: 978-3-642-19347-7 (Print) 978-3-642-19348-4 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. Keynote Talks

    1. Chapter

      Pages 1-7

      Towards Knowledge Intensive Data Privacy

    2. Chapter

      Pages 8-21

      Privacy in Data Publishing

  3. Data Privacy Management

    1. Chapter

      Pages 22-35

      A User-Oriented Anonymization Mechanism for Public Data

    2. Chapter

      Pages 36-50

      FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa

    3. Chapter

      Pages 51-63

      Secret-Sharing Hardware Improves the Privacy of Network Monitoring

    4. Chapter

      Pages 64-78

      Non-uniform Stepping Approach to RFID Distance Bounding Problem

    5. Chapter

      Pages 79-92

      E-Ticketing Scheme for Mobile Devices with Exculpability

    6. Chapter

      Pages 93-107

      Privacy Enforcement and Analysis for Functional Active Objects

    7. Chapter

      Pages 108-122

      L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols

    8. Chapter

      Pages 123-139

      Surveillance, Privacy and the Law of Requisite Variety

    9. Chapter

      Pages 140-154

      A Notation for Policies Using Feature Structures

  4. Autonomous and Spontaneous Security

    1. Chapter

      Pages 155-169

      Securing P2P Storage with a Self-organizing Payment Scheme

    2. Chapter

      Pages 170-187

      STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems

    3. Chapter

      Pages 188-202

      DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    4. Chapter

      Pages 203-215

      MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    5. Chapter

      Pages 216-230

      A DSL for Specifying Autonomic Security Management Strategies

    6. Chapter

      Pages 231-243

      Secure and Scalable RFID Authentication Protocol

    7. Chapter

      Pages 244-258

      Some Ideas on Virtualized System Security, and Monitors

  5. Back Matter

    Pages -