LEADER 03884nam 22007455 450 001 996466433203316 005 20200702010853.0 010 $a3-319-95729-5 024 7 $a10.1007/978-3-319-95729-6 035 $a(CKB)4100000005323187 035 $a(DE-He213)978-3-319-95729-6 035 $a(MiAaPQ)EBC6245912 035 $a(PPN)229502520 035 $a(EXLCZ)994100000005323187 100 $a20180709d2018 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData and Applications Security and Privacy XXXII$b[electronic resource] $e32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16?18, 2018, Proceedings /$fedited by Florian Kerschbaum, Stefano Paraboschi 205 $a1st ed. 2018. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2018. 215 $a1 online resource (XI, 350 p. 105 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v10980 311 $a3-319-95728-7 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the refereed proceedings of the 32nd Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2018, held in Bergamo, Italy, in July 2018. The 16 full papers and 5 short papers presented were carefully reviewed and selected from 50 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections on administration, access control policies, privacy-preserving access and computation, integrity and user interaction, security analysis and private evaluation, fixing vulnerabilities, and networked systems. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI ;$v10980 606 $aComputer security 606 $aComputers and civilization 606 $aComputers 606 $aLaw and legislation 606 $aApplication software 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aLegal Aspects of Computing$3https://scigraph.springernature.com/ontologies/product-market-codes/I24059 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aComputer security. 615 0$aComputers and civilization. 615 0$aComputers. 615 0$aLaw and legislation. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 14$aSystems and Data Security. 615 24$aComputers and Society. 615 24$aLegal Aspects of Computing. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aKerschbaum$b Florian$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aParaboschi$b Stefano$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466433203316 996 $aData and Applications Security and Privacy XXXII$92262510 997 $aUNISA