1.

Record Nr.

UNINA9910337567303321

Titolo

Information Security : 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers / / edited by Hein Venter, Marianne Loock, Marijke Coetzee, Mariki Eloff, Jan Eloff

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019

ISBN

3-030-11407-4

Edizione

[1st ed. 2019.]

Descrizione fisica

1 online resource (XVI, 193 p. 38 illus., 23 illus. in color.)

Collana

Communications in Computer and Information Science, , 1865-0929 ; ; 973

Disciplina

005.8

Soggetti

Data protection

Application software

Computers

Law and legislation

Computer organization

Security

Information Systems Applications (incl. Internet)

Legal Aspects of Computing

Computer Systems Organization and Communication Networks

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Authentication -- Access control -- Digital (cyber) forensics -- Cyber security -- Mobile and wireless security -- Privacy-preserving protocols -- Authorization -- Trust frameworks -- Security requirements -- Formal security models -- Malware and its mitigation -- Intrusion detection systems -- Social engineering -- Operating systems security -- Browser security -- Denial-of-service attacks -- Vulnerability management -- File system security -- Firewalls -- Web protocol security -- Digital rights management -- Distributed systems security.

Sommario/riassunto

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers



presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.