000 | 03150nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-29883-2 | ||
003 | DE-He213 | ||
005 | 20200421111158.0 | ||
007 | cr nn 008mamaa | ||
008 | 160330s2016 gw | s |||| 0|eng d | ||
020 |
_a9783319298832 _9978-3-319-29883-2 |
||
024 | 7 |
_a10.1007/978-3-319-29883-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData Privacy Management, and Security Assurance _h[electronic resource] : _b10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers / _cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXV, 291 p. 68 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9481 |
|
520 | _aThis book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aManagement information systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. |
|
700 | 1 |
_aNavarro-Arribas, Guillermo. _eeditor. |
|
700 | 1 |
_aAldini, Alessandro. _eeditor. |
|
700 | 1 |
_aMartinelli, Fabio. _eeditor. |
|
700 | 1 |
_aSuri, Neeraj. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319298825 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9481 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-29883-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c53644 _d53644 |