000 05487nam a22006615i 4500
001 978-3-319-67816-0
003 DE-He213
005 20240730201735.0
007 cr nn 008mamaa
008 170912s2017 sz | s |||| 0|eng d
020 _a9783319678160
_9978-3-319-67816-0
024 7 _a10.1007/978-3-319-67816-0
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aData Privacy Management, Cryptocurrencies and Blockchain Technology
_h[electronic resource] :
_bESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings /
_cedited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXIII, 446 p. 68 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v10436
505 0 _aA Proof Calculus for Attack Trees in Isabelle -- Confidentiality of Interactions in Concurrent Object-Oriented Systems -- Using Oblivious RAM in Genomic Studies -- Towards Efficient and Secure Encrypted Databases: Extending -- Message-Locked Encryption in Three-Party Model -- Searchable Encrypted Relational Databases: Risks and Countermeasures -- Private verification of access on medical data: an initial study -- Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences -- Bounding Privacy Leaks in Privacy Preserving Data Mining -- Threshold Single Password Authentication -- Towards A Toolkit for Utility and Privacy-Preserving Transformation of Semi-structured Data Using Data Pseudonymization -- Enforcement of External Anonymization -- DLoc: Distributed Auditing for Data Location Compliance in Cloud -- Inonymous: Anonymous Invitation-Based System -- Order-Preserving Encryption Using Approximate Integer Common Divisors -- Privacy-Preserving Deterministic Automata Evaluation with Encrypted Data Blocks -- Securing Proof-of-Stake Blockchain Protocols -- Merged Mining: Curse or Cure? -- Atomically Trading with Roger: Gambling on the success of a hardfork -- Smart Contracts and Blockchain Identity -- In Code We Trust? Measuring the Control Flow Immutability of All -- Smart Contracts Deployed on Ethereum -- Who Am I? Secure Identity Registration on Distributed Ledgers -- User-centric System for Verified Identities on the Bitcoin Blockchain -- Towards a Concurrent and Distributed Route Selection for Payment Channel Networks -- Graphene: A New Protocol for Block Propagation Using Set Reconciliation -- Revisiting Difficulty Control for Blockchain Systems -- Secure Event Tickets on a Blockchain.
520 _aThis book constitutes the refereed conference proceedings of the 12th International Workshop on Data Privacy Management, DPM 2017, on conjunction with the 22nd European Symposium on Research in computer Security, ESORICS 2017 and the First International Workshop on Cryprocurrencies and Blockchain Technology (CBT 2017) held in Oslo, Norway, in September 2017. The DPM Workshop received 51 submissions from which 16 full papers were selected for presentation. The papers focus on challenging problems such as translation of high-level buiness goals into system level privacy policies, administration of sensitive identifiers, data integration and privacy engineering. From the CBT Workshop six full papers and four short papers out of 27 submissions are included. The selected papers cover aspects of identity management, smart contracts, soft- and hardforks, proof-of-works and proof of stake as well as on network layer aspects and the application of blockchain technology for secure connect event ticketing.
650 0 _aData protection.
_97245
650 0 _aElectronic data processing
_xManagement.
_9168527
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aApplication software.
_9168528
650 0 _aAlgorithms.
_93390
650 1 4 _aData and Information Security.
_931990
650 2 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
650 2 4 _aComputer and Information Systems Applications.
_9168529
650 2 4 _aAlgorithms.
_93390
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168530
700 1 _aNavarro-Arribas, Guillermo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168531
700 1 _aHartenstein, Hannes.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_930419
700 1 _aHerrera-Joancomartí, Jordi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168532
710 2 _aSpringerLink (Online service)
_9168533
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319678153
776 0 8 _iPrinted edition:
_z9783319678177
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v10436
_9168534
856 4 0 _uhttps://doi.org/10.1007/978-3-319-67816-0
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96687
_d96687