LEADER 04595nam 22008055 450 001 9910484115403321 005 20251226195139.0 010 $a3-319-31811-X 024 7 $a10.1007/978-3-319-31811-0 035 $a(CKB)3710000000653140 035 $a(SSID)ssj0001666065 035 $a(PQKBManifestationID)16455289 035 $a(PQKBTitleCode)TC0001666065 035 $a(PQKBWorkID)14999811 035 $a(PQKB)11586743 035 $a(DE-He213)978-3-319-31811-0 035 $a(MiAaPQ)EBC6288006 035 $a(MiAaPQ)EBC5592282 035 $a(Au-PeEL)EBL5592282 035 $a(OCoLC)946073289 035 $a(PPN)193443902 035 $a(EXLCZ)993710000000653140 100 $a20160401d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aRisks and Security of Internet and Systems $e10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers /$fedited by Costas Lambrinoudakis, Alban Gabillon 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 307 p. 72 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9572 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-31810-1 327 $aAddressing Privacy and Trust Issues in Cultural Heritage Modelling -- An Ontology Regulating Privacy Oriented Access Controls -- A Literature Survey and Classifications on Data Deanonymisation -- Improving Users? Trust through Friendly Privacy Policies: An Empirical Study -- MPLS Policy Target Recognition Network -- Context aware Intrusion Response Based on Argumentation Logic -- Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management -- Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security -- Exploring a Controls-Based Assessment of Infrastructure Vulnerability -- Quantifying Security in Web ETL Processes -- A Meta-Model for Assisting a Cloud Forensics Process -- POR-2P: Network Coding-Based POR for Data Provision-Payment System -- A Single Key Scheduling Based Compression Function -- Security Issue of Wireless HART Based SCADA Systems -- Attack Volume Model: Geometrical Approach and Application -- An Intensive Analysis of Security and Privacy Browser Add-Ons -- MBotCS: A mobile Botnet Detection System Based on Machine Learning -- Toward Securing MANET against the Energy Depletion Attack. . 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Risks and Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island, Greece, in July 2015. The 18 full papers presented were selected from 50 submissions. The papers sessions that have covered a broad range of topics: trust and privacy issues, privacy policies and policy based protocols, risk management, risk analysis and vulnerability assessment, cloud systems and cryptography, and attack and security measures. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9572 606 $aData protection 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aApplication software 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aComputer and Information Systems Applications. 676 $a005.8 702 $aLambrinoudakis$b Costas$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGabillon$b Alban$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484115403321 996 $aRisks and Security of Internet and Systems$92102247 997 $aUNINA