The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal rules should be bound together for m
Adopting a multi-disciplinary and comparative approach, this book focuses on emerging and innovative attempts to tackle privacy and legal issues in cloud comput
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented an
These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this