Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNINA-9910484176403321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2009] |
Descrizione fisica | 1 online resource (324 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Database security
Computer networks - Security measures Computers - Access control |
ISBN |
1-282-29798-8
9786612297984 3-642-03007-6 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications. |
Record Nr. | UNISA-996465625403316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNINA-9910484973703321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2007] |
Descrizione fisica | 1 online resource (X, 254 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computers - Access control
Computers - Access control - Evaluation Computer networks - Security measures |
ISBN | 3-540-73614-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents. |
Record Nr. | UNISA-996466117903316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
EDPACS : the EDP audit, control and security newsletter |
Pubbl/distr/stampa | [Boston, MA], : Auerbach |
Disciplina | 005 |
Soggetto topico |
Electronic data processing - Auditing
Computers - Access control Electronic data processing departments - Security measures |
Soggetto genere / forma | Periodicals. |
ISSN | 1936-1009 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
EDP audit, control and security newsletter
Electronic data processing audit, control and security newsletter |
Record Nr. | UNISA-996202151303316 |
[Boston, MA], : Auerbach | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
EDPACS : the EDP audit, control and security newsletter |
Pubbl/distr/stampa | [Boston, MA], : Auerbach |
Disciplina | 005 |
Soggetto topico |
Electronic data processing - Auditing
Computers - Access control Electronic data processing departments - Security measures |
Soggetto genere / forma | Periodicals. |
ISSN | 1936-1009 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
EDP audit, control and security newsletter
Electronic data processing audit, control and security newsletter |
Record Nr. | UNINA-9910231843403321 |
[Boston, MA], : Auerbach | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EICC '23 : Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference / / edited by Aleksandra Mileva, Steffen Wendzel, Virginia Franqueira |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2023 |
Descrizione fisica | 1 online resource (205 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910725933903321 |
New York, NY : , : Association for Computing Machinery, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
EuroSec '21 : Proceedings of the 14th European Workshop on Systems Security / / Association for Computing Machinery |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2021 |
Descrizione fisica | 1 online resource (62 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510461103321 |
New York, NY : , : Association for Computing Machinery, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information [[electronic resource] ] : (fiscal year 2006) / / KPMG |
Pubbl/distr/stampa | [Washington, DC] : , : U.S. Environmental Protection Agency, Office of Inspector General, , [2007] |
Descrizione fisica | 33 unnumbered pages : digital, PDF file |
Collana | Audit report |
Soggetto topico |
Computer security - United States
Computers - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information |
Record Nr. | UNINA-9910695890703321 |
[Washington, DC] : , : U.S. Environmental Protection Agency, Office of Inspector General, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers / / Orr Dunkelman (ed.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2009] |
Descrizione fisica | 1 online resource (425 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computers - Access control |
ISBN |
1-282-33190-6
9786612331909 3-642-03317-2 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. |
Record Nr. | UNINA-9910483441103321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2009] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|