LEADER 05139nam 22007935 450 001 9910734887303321 005 20251225205540.0 010 $a9783031375866 010 $a3031375866 024 7 $a10.1007/978-3-031-37586-6 035 $a(CKB)27559769000041 035 $a(MiAaPQ)EBC30627433 035 $a(Au-PeEL)EBL30627433 035 $a(DE-He213)978-3-031-37586-6 035 $a(PPN)272249955 035 $a(OCoLC)1390558210 035 $a(EXLCZ)9927559769000041 100 $a20230706d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData and Applications Security and Privacy XXXVII $e37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19?21, 2023, Proceedings /$fedited by Vijayalakshmi Atluri, Anna Lisa Ferrara 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (415 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13942 311 08$a9783031375859 327 $aPrivacy 1 -- (Local) Differential Privacy has NO Disparate Impact on Fairness -- Building Quadtrees for Spatial Data under Local Differential Privacy -- Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy -- Secure Data Sharing -- New Results on Distributed Secret Sharing Protocols -- Probabilistic Fingerprinting Scheme for Correlated Data -- Optimized stream-cipher-based transciphering by means of functional-bootstrapping -- Applications 1 -- Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends -- Impact of using a privacy model on smart buildings data for CO2 prediction -- Digital Twins for IoT Security Management -- Privacy 2 -- Distribution Invariant Local Differential Privacy For Federated Learning -- On the utility gain of iterative bayesian update for locally differentially private protocols -- Differentially Private Streaming Data Release under Temporal Correlations via Post-processing -- Access Control and Vulnerability Assessment -- Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments -- Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach -- SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity -- Machine Learning -- Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks -- CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery -- An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning -- Mobile Applications -- Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications -- Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin -- A Dynamic Approach to Defuse Logic Bombs in Android Applications -- Applications 2 -- AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit -- Essential Information from Vulnerability Descriptions for CVSS Evaluation -- Hybrid Consensus in Blockchain Protocols for correctness and Progress. 330 $aThis volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19?21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13942 606 $aData protection 606 $aComputers 606 $aArtificial intelligence 606 $aData structures (Computer science) 606 $aInformation theory 606 $aDatabase management 606 $aApplication software 606 $aData and Information Security 606 $aComputing Milieux 606 $aArtificial Intelligence 606 $aData Structures and Information Theory 606 $aDatabase Management System 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputers. 615 0$aArtificial intelligence. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aDatabase management. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputing Milieux. 615 24$aArtificial Intelligence. 615 24$aData Structures and Information Theory. 615 24$aDatabase Management System. 615 24$aComputer and Information Systems Applications. 676 $a005.8 676 $a005.8 700 $aAtluri$b Vijayalakshmi$01372665 701 $aFerrara$b Anna Lisa$01372666 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910734887303321 996 $aData and Applications Security and Privacy XXXVII$93403551 997 $aUNINA