1.

Record Nr.

UNINA9910709597003321

Autore

Waltermire David

Titolo

Guidelines for the creation of interoperable software identification (SWID) tags / / David Waltermire; Brant A. Cheikes; Larry Feldman; Greg Witte

Pubbl/distr/stampa

Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2016

Descrizione fisica

1 online resource (86 pages) : illustrations (black and white)

Collana

NISTIR ; ; 8060

Altri autori (Persone)

CheikesBrant A

FeldmanLarry

WaltermireDavid

WitteGreg

Soggetti

Computer software - Development - Management

Computer software

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

April 2016.

Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.

Title from PDF title page (viewed April 30, 2016).

Nota di bibliografia

Includes bibliographical references.

Sommario/riassunto

This report provides an overview of the capabilities and usage of software identification (SWID) tags as part of a comprehensive software lifecycle. As instantiated in the International Organization for Standardization/International Electrotechnical Commission 19770-2 standard, SWID tags support numerous applications for software asset management and information security management. This report introduces SWID tags in an operational context, provides guidelines for the creation of interoperable SWID tags, and highlights key usage scenarios for which SWID tags are applicable.



2.

Record Nr.

UNINA9910851986503321

Titolo

ICT Systems Security and Privacy Protection : 38th IFIP TC 11 International Conference, SEC 2023, Poznan, Poland, June 14–16, 2023, Revised Selected Papers / / edited by Norbert Meyer, Anna Grocholewska-Czuryło

Pubbl/distr/stampa

Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024

ISBN

9783031563263

3031563263

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (XIII, 378 p. 100 illus., 79 illus. in color.)

Collana

IFIP Advances in Information and Communication Technology, , 1868-422X ; ; 679

Disciplina

005.8

Soggetti

Data protection

Computer engineering

Computer networks

Computers

Cryptography

Data encryption (Computer science)

Data and Information Security

Computer Engineering and Networks

Computing Milieux

Computer Communication Networks

Cryptology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Web Content Integrity Tamper-proof websites beyond HTTPS -- Privacy-Preserving Clustering for Multi-Dimensional Data Randomization under LDP -- Hierarchical Model-Based Cybersecurity Risk Assessment During System Design -- The Influence of Privacy Concerns on Cryptocurrency Acceptance -- Automated Enrichment of Logical Attack Graphs via Formal Ontologies -- Detecting Web Bots via Mouse Dynamics and Communication Metadata -- Practical Single-Round Secure Wildcard Pattern Matching -- Efficient non-interactive



anonymous communication -- PointPuff An Ed25519 Optimization Implementation -- Detecting web tracking at the network layer -- What’s inside a node? Malicious IPFS nodes under the magnifying glass -- Quantum-secure Communication for Trusted Edge Computing with IoT Devices -- Evaluation of a Red Team Automation Tool in live Cyber Defence Exercises -- Automated and Improved Detection of Cyber Attacks via an Industrial IDS Probe -- An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network -- Towards An Information Privacy Competency Model for the Usage of Mobile Applications -- SecPassInput: Towards Secure Memory and Password Handling in Web Applications -- Bl0ck Paralyzing 802.11 connections through Block Ack frames -- Enhancing the ACME Protocol to Automate the Management of All X 509 Web Certificates -- MADONNA Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis -- Cyber Key Terrain Identification Using Adjusted PageRank Centrality -- Machine Learning Metrics for Network Datasets Evaluation -- Factors of Intention to Use a Photo Tool: Comparison between Privacy-enhancing and Non-privacy-enhancing Tools -- Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack -- Toward the Establishment of Evaluating URL Embedding Methods using Intrinsic Evaluator viaMalicious URLs Detection -- Key Management Based on Ownership of Multiple Authenticators in Public Key Authentication.

Sommario/riassunto

This book constitutes the refereed proceedings of the 38th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2023, held in Poznan, Poland, in June 2023. The 26 full papers included in this book were carefully reviewed and selected from 84 submissions. They focus on topics such as access control and authentication; applied cryptography; mobile security; side-channel attacks; trust management, digital forensics; industry networks security, etc. .