top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Descrizione fisica 1 online resource (324 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Database security
Computer networks - Security measures
Computers - Access control
ISBN 1-282-29798-8
9786612297984
3-642-03007-6
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications.
Record Nr. UNINA-9910484176403321
Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Data and applications security XXIII : 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009 ; proceedings / / Ehud Gudes, Jaideep Vaidya (editors)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Descrizione fisica 1 online resource (324 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Database security
Computer networks - Security measures
Computers - Access control
ISBN 1-282-29798-8
9786612297984
3-642-03007-6
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Database Security I -- Controlled Query Evaluation and Inference-Free View Updates -- Implementing Reflective Access Control in SQL -- Security Policies -- An Approach to Security Policy Configuration Using Semantic Threat Graphs -- Reaction Policy Model Based on Dynamic Organizations and Threat Context -- Towards System Integrity Protection with Graph-Based Policy Analysis -- Privacy I -- Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation -- Privacy-Preserving Telemonitoring for eHealth -- Intrusion Detection and Protocols -- Analysis of Data Dependency Based Intrusion Detection System -- Secure Method Calls by Instrumenting Bytecode with Aspects -- Access Control -- Distributed Privilege Enforcement in PACS -- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates -- Using Edit Automata for Rewriting-Based Security Enforcement -- Privacy II -- Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers -- Detecting Inference Channels in Private Multimedia Data via Social Networks -- Database Security II -- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients -- Data Is Key: Introducing the Data-Based Access Control Paradigm -- Trusted Computing -- Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology -- PAES: Policy-Based Authority Evaluation Scheme -- Short Papers -- Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC -- Methods for Computing Trust and Reputation While Preserving Privacy -- Building an Application Data Behavior Model for Intrusion Detection -- A Trust-Based Access Control Model for Pervasive Computing Applications.
Record Nr. UNISA-996465625403316
Berlin, Heidelberg : , : Springer-Verlag, , [2009]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors)
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (X, 254 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Computers - Access control - Evaluation
Computer networks - Security measures
ISBN 3-540-73614-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.
Record Nr. UNINA-9910484973703321
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors)
Detection of intrusions and malware, and vulnerability assessment : 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007 ; proceedings / / Bernhard M. Hämmerli, Robin Sommer (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Descrizione fisica 1 online resource (X, 254 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computers - Access control
Computers - Access control - Evaluation
Computer networks - Security measures
ISBN 3-540-73614-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Web Security -- Extensible Web Browser Security -- On the Effectiveness of Techniques to Detect Phishing Sites -- Protecting the Intranet Against “JavaScript Malware” and Related Attacks -- Intrusion Detection -- On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements -- Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract) -- Characterizing Bots’ Remote Control Behavior -- Traffic Analysis -- Measurement and Analysis of Autonomous Spreading Malware in a University Environment -- Passive Monitoring of DNS Anomalies -- Characterizing Dark DNS Behavior -- Network Security -- Distributed Evasive Scan Techniques and Countermeasures -- On the Adaptive Real-Time Detection of Fast-Propagating Network Worms -- Host Security -- Targeting Physically Addressable Memory -- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks -- A Study of Malcode-Bearing Documents.
Record Nr. UNISA-996466117903316
Berlin, Heidelberg : , : Springer-Verlag, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
EDPACS : the EDP audit, control and security newsletter
EDPACS : the EDP audit, control and security newsletter
Pubbl/distr/stampa [Boston, MA], : Auerbach
Disciplina 005
Soggetto topico Electronic data processing - Auditing
Computers - Access control
Electronic data processing departments - Security measures
Soggetto genere / forma Periodicals.
ISSN 1936-1009
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti EDP audit, control and security newsletter
Electronic data processing audit, control and security newsletter
Record Nr. UNISA-996202151303316
[Boston, MA], : Auerbach
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
EDPACS : the EDP audit, control and security newsletter
EDPACS : the EDP audit, control and security newsletter
Pubbl/distr/stampa [Boston, MA], : Auerbach
Disciplina 005
Soggetto topico Electronic data processing - Auditing
Computers - Access control
Electronic data processing departments - Security measures
Soggetto genere / forma Periodicals.
ISSN 1936-1009
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti EDP audit, control and security newsletter
Electronic data processing audit, control and security newsletter
Record Nr. UNINA-9910231843403321
[Boston, MA], : Auerbach
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
EICC '23 : Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference / / edited by Aleksandra Mileva, Steffen Wendzel, Virginia Franqueira
EICC '23 : Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference / / edited by Aleksandra Mileva, Steffen Wendzel, Virginia Franqueira
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2023
Descrizione fisica 1 online resource (205 pages)
Disciplina 005.8
Soggetto topico Computer security
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910725933903321
New York, NY : , : Association for Computing Machinery, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
EuroSec '21 : Proceedings of the 14th European Workshop on Systems Security / / Association for Computing Machinery
EuroSec '21 : Proceedings of the 14th European Workshop on Systems Security / / Association for Computing Machinery
Pubbl/distr/stampa New York, NY : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource (62 pages)
Disciplina 005.8
Soggetto topico Computer security
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510461103321
New York, NY : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information [[electronic resource] ] : (fiscal year 2006) / / KPMG
Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information [[electronic resource] ] : (fiscal year 2006) / / KPMG
Pubbl/distr/stampa [Washington, DC] : , : U.S. Environmental Protection Agency, Office of Inspector General, , [2007]
Descrizione fisica 33 unnumbered pages : digital, PDF file
Collana Audit report
Soggetto topico Computer security - United States
Computers - Access control
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Evaluation of U.S. Chemical Safety and Hazard Investigation Board's compliance with the Federal Information Security Management Act and efforts to protect sensitive agency information
Record Nr. UNINA-9910695890703321
[Washington, DC] : , : U.S. Environmental Protection Agency, Office of Inspector General, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers / / Orr Dunkelman (ed.)
Fast software encryption : 16th international workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009 ; revised selected papers / / Orr Dunkelman (ed.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2009]
Descrizione fisica 1 online resource (425 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computers - Access control
ISBN 1-282-33190-6
9786612331909
3-642-03317-2
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Record Nr. UNINA-9910483441103321
Berlin, Germany ; ; New York, New York : , : Springer, , [2009]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui