Protecting persons while protecting the people: Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5661 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | X, 137 S. Ill., graph. Darst. 24 cm |
ISBN: | 9783642102325 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035828659 | ||
003 | DE-604 | ||
005 | 20091218 | ||
007 | t| | ||
008 | 091116s2009 xx ad|| |||| 10||| eng d | ||
015 | |a 09,N44,0042 |2 dnb | ||
016 | 7 | |a 997432985 |2 DE-101 | |
020 | |a 9783642102325 |c kart. : EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.) |9 978-3-642-10232-5 | ||
024 | 3 | |a 9783642102325 | |
028 | 5 | 2 | |a 12776047 |
035 | |a (OCoLC)462918296 | ||
035 | |a (DE-599)DNB997432985 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 004 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Protecting persons while protecting the people |b Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers |c Cecilia S. Gal ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a X, 137 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5661 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung | |
650 | 4 | |a Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008 | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Information society |v Congresses | |
650 | 4 | |a National security |v Congresses | |
650 | 4 | |a Privacy, Right of |v Congresses | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anonymität |0 (DE-588)4471050-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | 2 | |a Anonymität |0 (DE-588)4471050-1 |D s |
689 | 0 | 3 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | 4 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 5 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Netzwerkverwaltung |0 (DE-588)4314339-8 |D s |
689 | 1 | 1 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 1 | 2 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 1 | 3 | |a Monitoring |g Informatik |0 (DE-588)4522632-5 |D s |
689 | 1 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Gal, Cecilia S. |e Sonstige |4 oth | |
711 | 2 | |a Workshop on Information Privacy and National Security |n 2 |d 2008 |c New Brunswick, NJ |j Sonstige |0 (DE-588)16026838-2 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5661 |w (DE-604)BV000000607 |9 5661 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018687248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-018687248 |
Datensatz im Suchindex
_version_ | 1820875189654650880 |
---|---|
adam_text |
KONSTANTIN MERTSALOV TABLE OF CONTENTS THE CHALLENGES OF SEEKING
SECURITY WHILE RESPECTING PRIVACY 1 PAUL B. KANTOR AND MICHAEL E. LESK
SECTION ONE: STATEMENT OF THE PROBLEM INTELLIGENCE POLICY AND THE
SCIENCE OF INTELLIGENCE 11 MAUREEN BAGINSKI CYBER SECURITY: ASSESSING
OUR VULNERABILITIES AND DEVELOPING AN EFFECTIVE DEFENSE 20 EUGENE H.
SPAFFORD INTELLIGENCE, DATAVEILLANCE, AND INFORMATION PRIVACY 34 ROBYN
R. MACE RESULTS OF WORKSHOPS ON PRIVACY PROTECTION TECHNOLOGIES 45 CARL
LANDWEHR WORDS MATTER: PRIVACY, SECURITY, AND RELATED TERMS 57 JAMES J.
HORNING SECTION TWO: THEORETICAL APPROACHES TO THE PROBLEM KACTUS 2:
PRIVACY PRESERVING IN CLASSIFICATION TASKS USING K-ANONYMITY 63 SLAVA
KISILEVICH, YUVAL ELOVICI, BRACHA SHAPIRA, AND LIOR ROKACH VALID
STATISTICAL ANALYSIS FOR LOGISTIC REGRESSION WITH MULTIPLE SOURCES 82
STEPHEN E. FIENBERG, YUVAL NARDI, AND ALEKSANDRA B. SLAVKOVIC SECTION
THREE: PRACTICAL APPROACHES TO THE PROBLEM SUSPICIOUS ACTIVITY REPORTING
(SAR) 95 JOAN T. MCNAMARA STABLE STATISTICS OF THE BLOGOGRAPH 104 MARK
GOLDBERG, MALIK MAGDON-ISMAIL, STEPHEN KELLEY, AND BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/997432985 DIGITALISIERT DURCH X TABLE OF
CONTENTS PRIVACY-PRESERVING ACCOUNTABLE ACCURACY MANAGEMENT SYSTEMS
(PAAMS) 115 ROSHAN K. THOMAS, RAVI SANDHU, ELISA BERTINO, BUDAK ARPINAR,
AND SHOUHUAI XU ON THE STATISTICAL DEPENDENCY OF IDENTITY THEFT ON
DEMOGRAPHICS 122 GIOVANNI DI CRESCENZO AUTHOR INDEX 139 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV035828659 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 461f DAT 465f DAT 050f |
ctrlnum | (OCoLC)462918296 (DE-599)DNB997432985 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035828659</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20091218</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">091116s2009 xx ad|| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N44,0042</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">997432985</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642102325</subfield><subfield code="c">kart. : EUR 49.22 (freier Pr.), ca. sfr 71.50 (freier Pr.)</subfield><subfield code="9">978-3-642-10232-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642102325</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12776047</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)462918296</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB997432985</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting persons while protecting the people</subfield><subfield code="b">Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers</subfield><subfield code="c">Cecilia S. Gal ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 137 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5661</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information society</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Anonymität</subfield><subfield code="0">(DE-588)4471050-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Netzwerkverwaltung</subfield><subfield code="0">(DE-588)4314339-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Monitoring</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4522632-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gal, Cecilia S.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Workshop on Information Privacy and National Security</subfield><subfield code="n">2</subfield><subfield code="d">2008</subfield><subfield code="c">New Brunswick, NJ</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16026838-2</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5661</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5661</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018687248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018687248</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 gnd-content |
genre_facet | Konferenzschrift 2008 |
id | DE-604.BV035828659 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:11:40Z |
institution | BVB |
institution_GND | (DE-588)16026838-2 |
isbn | 9783642102325 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018687248 |
oclc_num | 462918296 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 |
physical | X, 137 S. Ill., graph. Darst. 24 cm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers Cecilia S. Gal ... (ed.) Berlin [u.a.] Springer 2009 X, 137 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5661 Literaturangaben Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008 Computer security Congresses Information society Congresses National security Congresses Privacy, Right of Congresses Datensicherung (DE-588)4011144-1 gnd rswk-swf Sicherheit (DE-588)4054790-5 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Anonymität (DE-588)4471050-1 gnd rswk-swf Monitoring Informatik (DE-588)4522632-5 gnd rswk-swf Netzwerkverwaltung (DE-588)4314339-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 gnd-content Internet (DE-588)4308416-3 s Privatsphäre (DE-588)4123980-5 s Anonymität (DE-588)4471050-1 s Identitätsverwaltung (DE-588)7546673-9 s Computersicherheit (DE-588)4274324-2 s Datensicherung (DE-588)4011144-1 s DE-604 Netzwerkverwaltung (DE-588)4314339-8 s Sicherheit (DE-588)4054790-5 s Monitoring Informatik (DE-588)4522632-5 s Kryptoanalyse (DE-588)4830502-9 s Gal, Cecilia S. Sonstige oth Workshop on Information Privacy and National Security 2 2008 New Brunswick, NJ Sonstige (DE-588)16026838-2 oth Lecture notes in computer science 5661 (DE-604)BV000000607 5661 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018687248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers Lecture notes in computer science Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008 Computer security Congresses Information society Congresses National security Congresses Privacy, Right of Congresses Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymität (DE-588)4471050-1 gnd Monitoring Informatik (DE-588)4522632-5 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4054790-5 (DE-588)7546673-9 (DE-588)4123980-5 (DE-588)4308416-3 (DE-588)4830502-9 (DE-588)4274324-2 (DE-588)4471050-1 (DE-588)4522632-5 (DE-588)4314339-8 (DE-588)1071861417 |
title | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers |
title_auth | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers |
title_exact_search | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers |
title_full | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers Cecilia S. Gal ... (ed.) |
title_fullStr | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers Cecilia S. Gal ... (ed.) |
title_full_unstemmed | Protecting persons while protecting the people Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers Cecilia S. Gal ... (ed.) |
title_short | Protecting persons while protecting the people |
title_sort | protecting persons while protecting the people second annual workshop on information privacy and national security isips 2008 new brunswick nj usa may 12 2008 revised selected papers |
title_sub | Second Annual Workshop on Information Privacy and National Security, ISIPS 2008, New Brunswick, NJ, USA, May 12, 2008 ; revised selected papers |
topic | Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008 Computer security Congresses Information society Congresses National security Congresses Privacy, Right of Congresses Datensicherung (DE-588)4011144-1 gnd Sicherheit (DE-588)4054790-5 gnd Identitätsverwaltung (DE-588)7546673-9 gnd Privatsphäre (DE-588)4123980-5 gnd Internet (DE-588)4308416-3 gnd Kryptoanalyse (DE-588)4830502-9 gnd Computersicherheit (DE-588)4274324-2 gnd Anonymität (DE-588)4471050-1 gnd Monitoring Informatik (DE-588)4522632-5 gnd Netzwerkverwaltung (DE-588)4314339-8 gnd |
topic_facet | Internet - Privatsphäre - Anonymität - Identitätsverwaltung - Computersicherheit - Datensicherung Netzwerkverwaltung - Privatsphäre - Sicherheit - Monitoring <Informatik> - Kryptoanalyse - Kongress 2008 Computer security Congresses Information society Congresses National security Congresses Privacy, Right of Congresses Datensicherung Sicherheit Identitätsverwaltung Privatsphäre Internet Kryptoanalyse Computersicherheit Anonymität Monitoring Informatik Netzwerkverwaltung Konferenzschrift 2008 |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018687248&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT galcecilias protectingpersonswhileprotectingthepeoplesecondannualworkshoponinformationprivacyandnationalsecurityisips2008newbrunswicknjusamay122008revisedselectedpapers AT workshoponinformationprivacyandnationalsecuritynewbrunswicknj protectingpersonswhileprotectingthepeoplesecondannualworkshoponinformationprivacyandnationalsecurityisips2008newbrunswicknjusamay122008revisedselectedpapers |