Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XI, 370 p. 25 illus.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database security
Data protection Statistics - Databases |
ISBN | 3-030-57521-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy models -- Microdata protection -- Protection of statistical tables -- Protection of interactive and mobility databases -- Record linkage and alternative methods -- Synthetic data -- Data quality -- Case studies. |
Record Nr. | UNINA-9910427714303321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privacy in statistical databases : UNESCO Chair in Data Privacy, International Conference, PSD 2020, Tarragona, Spain, September 23-25, 2020 : proceedings / / Josep Domingo-Ferrer, Krishnamurty Muralidhar (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XI, 370 p. 25 illus.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Database security
Data protection Statistics - Databases |
ISBN | 3-030-57521-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy models -- Microdata protection -- Protection of statistical tables -- Protection of interactive and mobility databases -- Record linkage and alternative methods -- Synthetic data -- Data quality -- Case studies. |
Record Nr. | UNISA-996418295203316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Protecting consumer information : can data breaches be prevented? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Thirteenth Congress, second session, February 5, 2014 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2015 |
Descrizione fisica | 1 online resource (iii, 204 pages) : illustrations |
Soggetto topico |
Data protection - United States
Database security - United States Computer crimes - United States - Prevention Consumer protection - United States Computer crimes - Prevention Consumer protection Data protection Database security |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Protecting Consumer Information |
Record Nr. | UNINA-9910708181903321 |
Washington : , : U.S. Government Publishing Office, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Protecting personal consumer information from cyber attacks and data breaches : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Thirteenth Congress, second session, March 26, 2014 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2014 |
Descrizione fisica | 1 online resource (iii, 111 pages) : illustrations |
Collana | S. hrg. |
Soggetto topico |
Data protection - United States
Consumer protection - United States Database security - United States Computer security - United States Identity theft - United States - Prevention Privacy, Right of - United States Computer security Consumer protection Data protection Database security Identity theft - Prevention Privacy, Right of |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Protecting personal consumer information from cyber attacks and data breaches |
Record Nr. | UNINA-9910703545303321 |
Washington : , : U.S. Government Publishing Office, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets |
Autore | Smallwood Robert F. <1959-> |
Pubbl/distr/stampa | New York, : Wiley, 2012 |
Descrizione fisica | 1 online resource (285 p.) |
Disciplina |
005.8
658.472 |
Soggetto topico |
BUSINESS & ECONOMICS / Information Management
Computer security Cyberspace - Security measures Cyberspace -- Security measures Database security Electronic records Computer security - Security measures Cyberspace |
ISBN |
1-119-20490-9
1-280-79277-9 9786613703163 1-118-28687-1 |
Classificazione | BUS083000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes CHAPTER 8 Information Governance and Security for Cloud Computing Use |
Record Nr. | UNINA-9910141258503321 |
Smallwood Robert F. <1959-> | ||
New York, : Wiley, 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 229 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers - Access control
Database security |
ISBN | 3-540-85259-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Keynote Paper -- How Anonymous Is k-Anonymous? Look at Your Quasi-ID -- Database Security -- Simulatable Binding: Beyond Simulatable Auditing -- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure -- Responding to Anomalous Database Requests -- Auditing Inference Based Disclosures in Dynamic Databases -- Trust Management -- An Approach to Evaluate Data Trustworthiness Based on Data Provenance -- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations -- A Trusted Approach to E-Commerce -- Privacy Protection -- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study -- Query Rewriting for Access Control on Semantic Web -- Security and Privacy in Healthcare -- On the Facilitation of Fine-Grained Access to Distributed Healthcare Data -- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare -- Position Papers -- A Methodology for Bridging between RBAC and an Arbitrary Application Program -- An Anonymity Model Achievable Via Microaggregation -- Engineering Privacy Requirements in Business Intelligence Applications. |
Record Nr. | UNINA-9910485026303321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, proceedings / / edited by Willem Jonker and Milan Petkovic |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 229 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computers - Access control
Database security |
ISBN | 3-540-85259-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Keynote Paper -- How Anonymous Is k-Anonymous? Look at Your Quasi-ID -- Database Security -- Simulatable Binding: Beyond Simulatable Auditing -- ARUBA: A Risk-Utility-Based Algorithm for Data Disclosure -- Responding to Anomalous Database Requests -- Auditing Inference Based Disclosures in Dynamic Databases -- Trust Management -- An Approach to Evaluate Data Trustworthiness Based on Data Provenance -- Exploiting Preferences for Minimal Credential Disclosure in Policy-Driven Trust Negotiations -- A Trusted Approach to E-Commerce -- Privacy Protection -- A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study -- Query Rewriting for Access Control on Semantic Web -- Security and Privacy in Healthcare -- On the Facilitation of Fine-Grained Access to Distributed Healthcare Data -- A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare -- Position Papers -- A Methodology for Bridging between RBAC and an Arbitrary Application Program -- An Anonymity Model Achievable Via Microaggregation -- Engineering Privacy Requirements in Business Intelligence Applications. |
Record Nr. | UNISA-996465635003316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Securing SQL server : protecting your database from attackers / / Denny Cherry |
Autore | Cherry Denny |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (xxii, 440 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico | Database security |
ISBN | 0-12-801375-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910793702903321 |
Cherry Denny | ||
Amsterdam, Netherlands : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing SQL server : protecting your database from attackers / / Denny Cherry |
Autore | Cherry Denny |
Edizione | [Third edition.] |
Pubbl/distr/stampa | Amsterdam, Netherlands : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (xxii, 440 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico | Database security |
ISBN | 0-12-801375-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910827682603321 |
Cherry Denny | ||
Amsterdam, Netherlands : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2014) : Wrocław, Poland September 11, 2014 / / Institute of Electrical and Electronics Engineers |
Pubbl/distr/stampa | Los Alamitos, CA : , : IEEE, , [2014] |
Descrizione fisica | 1 online resource (x, 90 pages) : illustrations |
Disciplina | 005.8 |
Soggetto topico | Database security |
ISBN | 1-4799-8309-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Committees -- Sponsors -- Full Papers -- ANDRUBIS - 1,000,000 Apps Later: A View on Current Android Malware Behaviors -- Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned -- Classification of SSL Servers based on their SSL Handshake for Automated Security Assessment -- Are We Missing Labels? A Study of the Availability of Ground-Truth in Network Security Research -- EyeBit: Eye-Tracking Approach for Enforcing Phishing Prevention Habits -- Short Papers -- The Vulnerability Dataset of a Large Software Ecosystem -- MATATABI: Multi-layer Threat Analysis Platform with Hadoop -- Collaborative Repository for Cybersecurity Data and Threat Information -- Author Index. |
Altri titoli varianti | 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security |
Record Nr. | UNISA-996280085603316 |
Los Alamitos, CA : , : IEEE, , [2014] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|