LEADER 03592nam 2200721Ia 450 001 9910462332803321 005 20200520144314.0 010 $a1-283-54074-6 010 $a9786613853196 010 $a1-61168-301-7 035 $a(CKB)2670000000246586 035 $a(EBL)1085107 035 $a(OCoLC)808670081 035 $a(SSID)ssj0000744552 035 $a(PQKBManifestationID)11378845 035 $a(PQKBTitleCode)TC0000744552 035 $a(PQKBWorkID)10844865 035 $a(PQKB)10743279 035 $a(MiAaPQ)EBC1085107 035 $a(MdBmJHUP)muse18921 035 $a(Au-PeEL)EBL1085107 035 $a(CaPaEBR)ebr10603782 035 $a(CaONFJC)MIL385319 035 $a(EXLCZ)992670000000246586 100 $a20120229d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aTime and the digital$b[electronic resource] $econnecting technology, aesthetics, and a process philosophy of time /$fTimothy Scott Barker 210 $aHanover, N.H. $cDartmouth College Press$dc2012 215 $a1 online resource (249 p.) 225 0 $aInterfaces, studies in visual culture 300 $aDescription based upon print version of record. 311 $a1-61168-299-1 320 $aIncludes bibliographical references (p. 215-225) and index. 327 $aTitle Page; Contents; Illustrations; Acknowledgments; Introduction; Whitehead and Deleuze; Trains, Telephones, Televisions; Mediation; Time, Process, and Multi-temporality; 1 | Experimenting with Time; Convergences; Performing Digital Aesthetics; Technology as Temporalizing; 2 | Time and Process; Process; Whitehead's Time; What Is an Event?; Perceiving Events; 3 | Deleuze's Timeand Serres's Multi-temporality; What Deleuze Reads in Bergson; The Virtual; Serres's Time and Digital "Presentness"; A Time That Moves Sideways; 4 | The Time of David Claerbout, Bill Viola, and Dan Graham 327 $aThe Time of David ClaerboutThe Time of Bill Viola; The Time of Dan Graham; 5 | Events & Interactive Aesthetics; The Event and Present; The Story Is Like a River . . .; Time and T_Visionarium; Re-presenting Events; Rethinking the User: Humans and Technology; 6 | Technology, Aesthetics, & Deleuze's Virtual; Time and the Virtual; Delays and Movement; Extensions, Entanglements, and Prehension; 7 | A Unison of Becoming; The Effect of Relations; A Digital Extensive Continuum; The Digital Past; Time, Process, and Databases; 8 | Databases and Time; Multi-temporality and Frames; Organizing Temporality 327 $aEvents and the ArchiveThe Database in Time; The Database and Temporal Relationships; Reterritorializing Data; Databases and the Extension of Occasions; Conclusion; Notes; Bibliography; Index 330 $aAn original consideration of the temporal in digital art and aesthetics 410 0$aInterfaces: Studies in Visual Culture 606 $aHuman-computer interaction 606 $aDigital media$xPhilosophy 606 $aSpace and time 606 $aAesthetics 606 $aTechnology and the arts 608 $aElectronic books. 615 0$aHuman-computer interaction. 615 0$aDigital media$xPhilosophy. 615 0$aSpace and time. 615 0$aAesthetics. 615 0$aTechnology and the arts. 676 $a004.01/9 676 $a004.019 700 $aBarker$b Timothy Scott$0978777 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462332803321 996 $aTime and the digital$92230984 997 $aUNINA LEADER 03252 am 22005893u 450 001 9910348215403321 005 20200229105050.0 010 $a9789048544271 035 $a(CKB)4100000009763424 035 $a(OAPEN)1005800 035 $a(DE-B1597)542034 035 $a(DE-B1597)9789048544271 035 $a(OCoLC)1127907863 035 $a(MiAaPQ)EBC6637419 035 $a(Au-PeEL)EBL6637419 035 $a(EXLCZ)994100000009763424 100 $a20200229h20192019 fg 101 0 $aeng 135 $auuuuu---auuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDevelopment on Loan $eMicrocredit and Marginalisation in Rural China /$fNicholas Loubere 210 1$aAmsterdam : $cAmsterdam University Press, $d[2019] 210 4$d©2019 215 $a1 online resource (285) 225 0 $aTransforming Asia 311 $a90-485-4427-0 327 $tFrontmatter -- $tTable of Contents -- $tAcknowledgements -- $tNote on Language, Currency Units, and Referencing -- $t1. Introduction -- $t2. Rural Financial Services in China -- $t3. Making Microcredit -- $t4. Variation in Microcredit Implementation -- $t5. Microcredit as Modernisation and De-marginalisation -- $t6. Microcredit, Precarious Livelihoods, and Undercurrents of Marginalisation -- $t7. Conclusion -- $tAcronyms -- $tGlossary of Chinese Terms -- $tInterviews -- $tBibliography 330 $aKey to China's plans to promote rural development is the de-marginalisation of the countryside through the incorporation of rural areas into the urban-based market-oriented financial system. For this reason, Chinese development planners have turned to microcredit -- i.e. the provision of small-scale loans to 'financially excluded' rural households -- as a means of increasing 'financial consciousness' and facilitating rural de-marginalisation. Drawing on in-depth fieldwork in rural China, this book examines the formulation, implementation and outcomes of government-run microcredit programmes in China-illuminating the diverse roles that microcredit plays in local processes of socioeconomic development and the livelihoods of local actors. It details how microcredit facilitates de-marginalisation for some, while simultaneously exacerbating the marginalisation of others; and exposes the ways in which microcredit and other top-down development strategies reflect and reinforce the contradictions and paradoxes implicit in rural China's contemporary development landscape. 410 0$aTransforming Asia Ser. 606 $aChina$2bicssc 606 $aMicroeconomics$2bicssc 608 $aElectronic books. 610 $aActor-oriented Approach. 610 $aChina. 610 $aFinancial Inclusion. 610 $aLivelihoods. 610 $aMarginalisation. 610 $aMicrocredit. 610 $aMicrofinance. 610 $aRelational Approach. 610 $aRural Development. 615 7$aChina 615 7$aMicroeconomics 700 $aLoubere$b Nicholas, $4aut$4http://id.loc.gov/vocabulary/relators/aut$0921006 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910348215403321 996 $aDevelopment on Loan$92065725 997 $aUNINA LEADER 11209nam 22006255 450 001 996534467103316 005 20230513204216.0 010 $a9783031311086$b(electronic bk.) 010 $z9783031311079 024 7 $a10.1007/978-3-031-31108-6 035 $a(MiAaPQ)EBC7248905 035 $a(Au-PeEL)EBL7248905 035 $a(OCoLC)1379235569 035 $a(DE-He213)978-3-031-31108-6 035 $a(BIP)089945061 035 $a(PPN)270612076 035 $a(EXLCZ)9926637484500041 100 $a20230513d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aRisks and Security of Internet and Systems$b[electronic resource] $e17th International Conference, CRiSIS 2022, Sousse, Tunisia, December 7-9, 2022, Revised Selected Papers /$fedited by Slim Kallel, Mohamed Jmaiel, Mohammad Zulkernine, Ahmed Hadj Kacem, Frédéric Cuppens, Nora Cuppens 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (268 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13857 311 08$aPrint version: Kallel, Slim Risks and Security of Internet and Systems Cham : Springer,c2023 9783031311079 327 $aIntro -- Preface -- Organization -- Contents -- Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security Flaws -- 1 Introduction -- 2 Related Work -- 2.1 Contribution -- 3 Dynamic Analysis Environment -- 4 Context Correlation and Issue Generation -- 4.1 Privacy Sensitive Data Sources -- 4.2 Data Sinks -- 4.3 Graph Generation -- 4.4 Example Graph -- 4.5 Graph Analysis: Issue Creation -- 4.6 Issue Correlation Pass -- 5 Evaluation -- 5.1 Overview and Statistics -- 5.2 Deep Manual Issue Inspection -- 5.3 Damn Vulnerable App -- 6 Conclusion and Future Work -- References -- Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes -- 1 Introduction -- 2 Related Works -- 2.1 Datasets -- 2.2 Machine Learning Use on CICDS2017 -- 2.3 Previous Criticism on CICIDS2017 -- 3 Errors in the CICIDS2017 Dataset and the CICFlowMeter Tool, and Their Fixes -- 3.1 CICFlowMeter Issue with Misordered Packets -- 3.2 Incoherent Timestamps -- 3.3 Dealing with Data Duplication -- 3.4 Attack Omission: Labelling Issues and Correction -- 4 Assessment of the Consequences on Intrusion Detection Models Performances -- 4.1 Experimental Evaluation Protocol -- 4.2 Experiments Results -- 5 Conclusion -- References -- A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 Dataset -- 1 Introduction -- 2 Literature Review -- 3 Dataset and Methods -- 3.1 Dataset -- 3.2 Attribute Selection Algorithms -- 3.3 Creating MLP Model -- 4 Modeling -- 5 Performance Evaluation -- 5.1 Scenario 1: 15 Feature -- 5.2 Scenario 2: 20 Feature -- 6 Conclusion -- References -- PRIAH: Private Alerts in Healthcare -- 1 Introduction -- 2 Background -- 2.1 Smart Hospital Ecosystem -- 2.2 Privacy-preserving Strategies. 327 $a2.3 Alert Detection and Edge Computing Paradigm -- 2.4 Big Data and Streaming Processing -- 3 Related Work -- 3.1 Alert Identification and Dissemination -- 3.2 Privacy Preservation -- 3.3 Real-Time Processing of Alerts -- 4 PRIAH Approach -- 4.1 PRIAH Components at the Edge -- 4.2 PRIAH Components at the Server Side -- 4.3 System Administrator -- 4.4 End-Users -- 5 Implementation and Results -- 5.1 Implementation -- 5.2 Evaluation -- 6 Conclusion -- References -- Tool Paper - SEMA: Symbolic Execution Toolchain for Malware Analysis -- 1 Context -- 2 The SEMA Toolset in a Nutshell -- 3 The Architecture of SEMA -- 4 SEMA in Action -- 5 Conclusion -- References -- Blockchain Survey for Security and Privacy in the e-Health Ecosystem -- 1 Introduction -- 2 Research Strategy -- 3 State of the Art -- 4 Background -- 4.1 Blockchain Technology Overview -- 4.2 e-Health Applications -- 5 Security and Privacy Requirements for e-Health Applications -- 6 Blockchain Platforms and Their Security Solutions -- 6.1 Hyperledger Fabric -- 6.2 Hyperledger Besu -- 6.3 Quorum -- 6.4 Corda R3 -- 6.5 Cosmos -- 7 A Security Framework for Blockchain-Based e-Health Applications -- 7.1 When Blockchain Can be Used in e-Health Applications ? -- 7.2 Which Blockchain Solution to Use? -- 8 Conclusions and Future Work -- References -- Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart Contracts -- 1 Introduction -- 2 Background Materials -- 2.1 Blockchain -- 2.2 Smart Contracts -- 2.3 Common Vulnerabilities -- 2.4 Blockchain Testing Techniques -- 3 Related Work -- 4 Proposed Approach -- 4.1 Modelling the Smart Contract and Its Blockchain Environment -- 4.2 Test Case Generation -- 4.3 Test Case Execution -- 4.4 Test Result Analysis and Test Report Generation -- 5 Illustration -- 5.1 Case Study Description -- 5.2 Modelling the E-voting System. 327 $a5.3 Test Case Generation -- 5.4 Test Tool Implementation -- 6 Conclusion -- References -- Blockchain Olive Oil Supply Chain -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Obtained Results -- 4.1 Implemented Blockchain on Raspberry Pi -- 4.2 Web Application -- 5 Conclusion -- References -- Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups -- 1 Introduction -- 2 Background -- 2.1 Layers 1 and 2 in Ethereum -- 2.2 Eip-1559 -- 3 Testing Approach -- 3.1 Smart Contract -- 3.2 Interaction with the Smart Contract -- 4 Experimentation -- 4.1 Testing Results -- 4.2 Discussion -- 5 Conclusion -- References -- Towards a Secure Cross-Blockchain Smart Contract Architecture -- 1 Introduction -- 2 Background and Related Work -- 3 Bifröst Extension Proposal -- 3.1 Smart Contracts Invocation -- 3.2 Fault Tolerance -- 3.3 Security -- 4 Discussion and Challenges -- 5 Conclusion and Future Work -- References -- Security Analysis: From Model to System Analysis -- 1 Introduction -- 2 Background -- 2.1 Previous MBSE Approach -- 2.2 Property Specification Patterns -- 2.3 OBP Model Checker -- 3 Motivating Example -- 3.1 System Presentation -- 3.2 General Approach -- 4 Detailed Approach -- 4.1 Environment Modeling -- 4.2 System State and Behavior -- 4.3 The OBP Model Checker -- 5 Security Property Modelling -- 5.1 Raising Abstraction Level of Formal Security Properties -- 5.2 From Attacker Interests to Formal Security Properties -- 6 Property Verification Results Analysis -- 6.1 Model Checking Embedded System Code -- 6.2 Security Property Verification -- 7 Related Works -- 8 Conclusion -- References -- Modeling Train Systems: From High-Level Architecture Graphical Models to Formal Specifications -- 1 Introduction -- 2 Background -- 2.1 Model-Driven Engineering -- 2.2 SysML -- 2.3 Event-B -- 2.4 ATO over ERTMS Case Study Excerpt. 327 $a3 Related Work -- 4 The Proposed Approach -- 4.1 High-level Architecture Graphical Modeling -- 4.2 Model Transformation and Event-B Generation -- 4.3 Formal Verification -- 5 Conclusion -- References -- How IT Infrastructures Break: Better Modeling for Better Risk Management -- 1 Introduction -- 2 Related Work -- 2.1 Risk Analysis -- 2.2 Infrastructure Modeling -- 3 Guided Risk Management for IT Infrastructures -- 3.1 Side-Effect Analysis -- 3.2 Part Analysis -- 3.3 Assembly Analysis -- 4 Case Study: A Cloud Infrastructure -- 4.1 Requirements -- 4.2 Infrastructure Model -- 4.3 Constraints -- 4.4 Risk -- 4.5 Lessons Learned -- 5 Conclusion and Future Work -- References -- IoT Security Within Small and Medium-Sized Manufacturing Companies -- 1 Introduction -- 2 Research Methodology -- 3 Data and Findings -- 3.1 Screening -- 3.2 Experience -- 3.3 Awareness -- 3.4 Activities -- 3.5 Knowledge -- 4 Conclusion and Further Research -- References -- An Incentive Mechanism for Managing Obligation Delegation -- 1 Introduction -- 2 Background -- 2.1 The Beta Distribution -- 2.2 Defining Obligations -- 3 An Incentive Scheme for One Hop Delegation -- 3.1 Obligation Trust -- 3.2 Delegating Obligations -- 4 Incentivising Schemes -- 4.1 Updating Obligation Trust -- 4.2 Earning Reward Credits -- 4.3 Eligibility of Delegatees -- 5 Cascaded Delegation of Obligations -- 6 Evaluation -- 6.1 Experimental Setup -- 6.2 Results -- 7 Related Work -- 8 Concluding Remarks -- References -- Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT Networks -- 1 Introduction -- 2 Background -- 2.1 Blockchain -- 2.2 Virtual Private Networks (VPN) -- 3 Related Work -- 3.1 Basic Access Control Model in IoTs -- 3.2 Inter-organisational Access Control Solution Overview -- 4 VPNBDAC for Large Scale IoT Network -- 4.1 Actors. 327 $a4.2 Smart Contract and Transactions -- 5 Implementation of the Prototype -- 6 Performance Evaluation -- 7 Conclusions -- References -- Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport Systems -- 1 Introduction -- 1.1 Pseudonyms in Cooperative Intelligent Transport Systems -- 1.2 Problem Statement -- 1.3 Contribution -- 2 Related Work -- 3 Preliminaries -- 4 System Model and Architecture -- 4.1 C-ITS Trust Model and Architecture -- 4.2 Threat Model -- 4.3 Pseudonym Swapping System Model -- 5 Pseudonym Swapping with Accumulator-Based Storage -- 5.1 Proposed Alignment to ETSI Standard -- 5.2 Proposed Security Architecture -- 5.3 Protocol Definition and Algorithms -- 6 Security Analysis -- 7 Proof of Concept Implementation -- 8 Conclusion -- References -- Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation Mechanism -- 1 Introduction -- 2 Related Work -- 3 Summary of MPPK KEM -- 3.1 Key Generation -- 3.2 Encryption -- 3.3 Decryption -- 4 Benchmarking MPPK -- 4.1 NIST Level I -- 4.2 NIST Level III -- 4.3 NIST Level V -- 5 Conclusion -- References -- Author Index. 330 $aThis book constitutes the proceedings of the 17th International Conference on Risks and Security of Internet and Systems, CRiSIS 2022, which took place in Sousse, Tunesia, during December 7-9, 2022. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13857 606 $aData protection 606 $aData and Information Security 610 $aComputer Security 610 $aComputers 615 0$aData protection. 615 14$aData and Information Security. 676 $a005.8 700 $aKallel$b Slim$01358330 701 $aJmaiel$b Mohamed$01351246 701 $aZulkernine$b Mohammad$01358331 701 $aHadj Kacem$b Ahmed$01358332 701 $aCuppens$b édéric$01333105 701 $aCuppens$b Nora$01358333 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996534467103316 996 $aRisks and Security of Internet and Systems$93367517 997 $aUNISA