Book Volume 6514 2011

Data Privacy Management and Autonomous Spontaneous Security

5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP 2010, Athens, Greece, September 23, 2010, Revised Selected Papers

ISBN: 978-3-642-19347-7 (Print) 978-3-642-19348-4 (Online)

Table of contents (18 chapters)

  1. Front Matter

    Pages -

  2. Keynote Talks

    1. No Access

      Chapter

      Pages 1-7

      Towards Knowledge Intensive Data Privacy

    2. No Access

      Chapter

      Pages 8-21

      Privacy in Data Publishing

  3. Data Privacy Management

    1. No Access

      Chapter

      Pages 22-35

      A User-Oriented Anonymization Mechanism for Public Data

    2. No Access

      Chapter

      Pages 36-50

      FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa

    3. No Access

      Chapter

      Pages 51-63

      Secret-Sharing Hardware Improves the Privacy of Network Monitoring

    4. No Access

      Chapter

      Pages 64-78

      Non-uniform Stepping Approach to RFID Distance Bounding Problem

    5. No Access

      Chapter

      Pages 79-92

      E-Ticketing Scheme for Mobile Devices with Exculpability

    6. No Access

      Chapter

      Pages 93-107

      Privacy Enforcement and Analysis for Functional Active Objects

    7. No Access

      Chapter

      Pages 108-122

      L–PEP: A Logic to Reason about Privacy–Enhancing Cryptography Protocols

    8. No Access

      Chapter

      Pages 123-139

      Surveillance, Privacy and the Law of Requisite Variety

    9. No Access

      Chapter

      Pages 140-154

      A Notation for Policies Using Feature Structures

  4. Autonomous and Spontaneous Security

    1. No Access

      Chapter

      Pages 155-169

      Securing P2P Storage with a Self-organizing Payment Scheme

    2. No Access

      Chapter

      Pages 170-187

      STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems

    3. No Access

      Chapter

      Pages 188-202

      DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    4. No Access

      Chapter

      Pages 203-215

      MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    5. No Access

      Chapter

      Pages 216-230

      A DSL for Specifying Autonomic Security Management Strategies

    6. No Access

      Chapter

      Pages 231-243

      Secure and Scalable RFID Authentication Protocol

    7. No Access

      Chapter

      Pages 244-258

      Some Ideas on Virtualized System Security, and Monitors

  5. Back Matter

    Pages -