Data Privacy Management and Autonomous Spontaneous Security

This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012. The volume contains 13 full papers selected out of 31 submissions and 3 keynote lectures from the DPM workshop and 10 papers selected among numerous submissions from the SETOP workshop. The contributions from DPM cover topics from location privacy, citizens' privacy, privacy, authentication with anonymity, privacy in distributed systems, privacy policies, and automated privacy enforcement. The SETOP contributions provide a unique view of ongoing security research work in a number of emerging environments that are becoming part of the global ICT infrastructure, from content-centric to mobile and wireless networks. Also, some of them cover the key role of run-time enforcement in process and service security. The topics of SETOP papers include: security policy deployment; distributed intrusion detection; autonomous and spontaneous response; privacy policies; secure localization; context aware and ubiquitous computing; identity management

[1]  Frederick Reiss,et al.  SystemT: a system for declarative information extraction , 2009, SGMD.

[2]  Geoffrey Smith,et al.  Secure Information Flow for Distributed Systems , 2009, Formal Aspects in Security and Trust.

[3]  Paul Ohm Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization , 2009 .

[4]  Jeffrey S. Fenton Information Protection Systems , 1973 .

[5]  Hamish Cunningham,et al.  GATE-a General Architecture for Text Engineering , 1996, COLING.

[6]  Florian Kammueller,et al.  A security model for functional active objects with an implementation in Erlang , 2011 .

[7]  Kees van Deemter,et al.  On Coreferring: Coreference in MUC and Related Annotation Schemes , 2000, CL.

[8]  Dieter Hutter,et al.  Security of multi-agent systems: A case study on comparison shopping , 2007, J. Appl. Log..

[9]  Adeline Nazarenko,et al.  Ontologies and Information Extraction , 2006, ArXiv.

[10]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[11]  O. Edfors,et al.  OFDM channel estimation by singular value decomposition , 1996, Proceedings of Vehicular Technology Conference - VTC.

[12]  Ludovic Henrio,et al.  ASPfun : A typed functional active object calculus , 2012, Sci. Comput. Program..

[13]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[14]  Kalina Bontcheva,et al.  Text Processing with GATE , 2011 .

[15]  Robert H. Halstead,et al.  MULTILISP: a language for concurrent symbolic computation , 1985, TOPL.

[16]  Florian Kammüller Privacy Enforcement and Analysis for Functional Active Objects , 2010, DPM/SETOP.

[17]  Lynette Hirschman,et al.  Automating Coreference: The Role of Annotated Training Data , 1998, ArXiv.

[18]  Carolyn L. Talcott,et al.  Towards a Theory of Actor Computation , 1992, CONCUR.

[19]  Alicia Ageno,et al.  Adaptive information extraction , 2006, CSUR.

[20]  Peter J. Denning,et al.  Certification of programs for secure information flow , 1977, CACM.

[21]  Anindya Banerjee,et al.  Stack-based access control and secure information flow , 2005, J. Funct. Program..

[22]  Hamish Cunningham,et al.  Information Extraction, Automatic , 2006 .

[23]  Jerry R. Hobbs The Generic Information Extraction System , 1993, MUC.

[24]  Martín Abadi,et al.  A Theory of Objects , 1996, Monographs in Computer Science.

[25]  Sharad Mehrotra,et al.  XAR: An Integrated Framework for Information Extraction , 2009, 2009 WRI World Congress on Computer Science and Information Engineering.

[26]  Diana Maynard,et al.  JAPE: a Java Annotation Patterns Engine , 2000 .

[27]  Denis Caromel,et al.  Secured Information Flow for Asynchronous Sequential Processes , 2007, SecCO@CONCUR.

[28]  Heiko Mantel,et al.  A Unifying Approach to the Security of Distributed and Multi-Threaded Programs , 2003, J. Comput. Secur..

[29]  John S. Baras,et al.  Physical-Layer Authentication , 2008, IEEE Transactions on Information Forensics and Security.

[30]  Denis Caromel,et al.  Asynchronous and deterministic objects , 2004, POPL.

[31]  Denis Caromel,et al.  ProActive: an integrated platform for programming and running applications on Grids and P2P systems , 2006 .

[32]  Sushil Jajodia,et al.  An audit model for object-oriented databases , 1991, Proceedings Seventh Annual Computer Security Applications Conference.

[33]  B. Davey,et al.  Introduction to Lattices and Order: Appendix B: further reading , 2002 .

[34]  Florian Kammueller,et al.  Using functional active objects to enforce privacy , 2010 .