LEADER 02732nam 2200361 450 001 9910510476303321 005 20230831042933.0 035 $a(CKB)5470000000736589 035 $a(NjHacI)995470000000736589 035 $a(EXLCZ)995470000000736589 100 $a20230831d2020 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop $eNovember 9, 2020, Virtual Event, USA /$fYinqian Zhang, Radu Sion 210 1$aNew York :$cAssociation for Computing Machinery,$d[2020] 210 4$dİ2020 215 $a1 online resource (176 pages) $cillustrations 311 $a1-4503-8084-0 330 $aIt is our great pleasure to welcome you to the 11th anniversary of the ACM Cloud Computing Security Workshop. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing including:Side channel attacksPractical cryptographic protocols for cloud securitySecure cloud resource virtualization mechanismsSecure data management outsourcing (e.g., database as a service)Practical privacy and integrity mechanisms for outsourcingFoundations of cloud-centric threat modelsSecure computation outsourcingRemote attestation mechanisms in cloudsSandboxing and VM-based enforcementsTrust and policy management in cloudsSecure identity management mechanismsNew cloud-aware web service security paradigms and mechanismsCloud-centric regulatory compliance issues and mechanismsBusiness and security risk models and cloudsCost and usability models and their interaction with security in cloudsScalability of security in global-size cloudsTrusted computing technology and cloudsBinary analysis of software for remote attestation and cloud protectionNetwork security (DOS, IDS etc.) mechanisms for cloud contextsSecurity for emerging cloud programming modelsEnergy/cost/efficiency of security in cloudsMachine learning for cloud protection CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. The workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds. 606 $aComputer security$vCongresses 615 0$aComputer security 676 $a005.8 700 $aZhang$b Yinqian$01417634 702 $aSion$b Radu 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910510476303321 996 $aProceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop$93526660 997 $aUNINA LEADER 02765nam 2200589 a 450 001 9910791363303321 005 20170815145054.0 010 $a1-282-62741-4 010 $a9786612627415 010 $a1-84545-878-8 024 7 $a10.1515/9781845458782 035 $a(CKB)2560000000012128 035 $a(EBL)544348 035 $a(OCoLC)645100956 035 $a(SSID)ssj0000432201 035 $a(PQKBManifestationID)12175493 035 $a(PQKBTitleCode)TC0000432201 035 $a(PQKBWorkID)10477731 035 $a(PQKB)11529405 035 $a(MiAaPQ)EBC544348 035 $a(DE-B1597)637597 035 $a(DE-B1597)9781845458782 035 $a(EXLCZ)992560000000012128 100 $a20080701d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aResponsible history$b[electronic resource] /$fAntoon De Baets 210 $aNew York $cBerghahn Books$d2009 215 $a1 online resource (292 p.) 300 $aDescription based upon print version of record. 311 $a1-84545-541-X 320 $aIncludes bibliographical references (p. [241]-258) and index. 327 $aTitle page-Respensible History; Contents; List of Tables; Foreword; Acknowledgements; Introduction; Part I-Irresponsible History; Chapter 1-A Theory of the Abuse of History; Chapter 2-The Dictator's Secret Archives; Chapter 3-Defamation Cases against Historians; Part II-Responsible History; Chapter 4-Duties of the Living to the Dead; Chapter 5-The Rights to Memory and History; Chapter 6-A Code of Ethics for Historians; Epilogue; Notes; Bibliography; Index 330 $aThe abuse of history is common and quite possibly once more on the rise. Although this is well documented, there is no general theory that enables historians to identify, prove, explain, and evaluate the many types of abuse of history. In this book, the author, founder of the Network of Concerned Historians, presents such a theory. Reflecting on the responsible use of history, the author identifies the duties that the living has toward the dead and analyzes the rights to memory and history necessary to fulfill these duties. He concludes his powerful argument by proposing a code of ethics as a 606 $aHistory$xMoral and ethical aspects 606 $aHistorians$xProfessional ethics 615 0$aHistory$xMoral and ethical aspects. 615 0$aHistorians$xProfessional ethics. 676 $a174.99 686 $a15.01$2bcl 686 $a15.02$2bcl 700 $aBaets$b Antoon de$f1955-$01317816 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910791363303321 996 $aResponsible history$93751047 997 $aUNINA