Data Privacy Management and Autonomous Spontaneous Security : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 265 p. 50 illus.) |
Disciplina |
005.437
4.019 |
Collana | Security and Cryptology |
Soggetto topico |
User interfaces (Computer systems)
Computers Law and legislation Computers and civilization Computer security Data encryption (Computer science) Computer communication systems User Interfaces and Human Computer Interaction Legal Aspects of Computing Computers and Society Systems and Data Security Cryptology Computer Communication Networks |
ISBN |
1-280-38537-5
9786613563293 3-642-11207-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talks -- The UNESCO Chair in Data Privacy Research in Vehicular Networks -- Privacy Management for Global Organizations -- Data Privacy Management -- Obligation Language and Framework to Enable Privacy-Aware SOA -- Distributed Privacy-Preserving Methods for Statistical Disclosure Control -- Towards a Privacy-Preserving National Identity Card -- Using SAT-Solvers to Compute Inference-Proof Database Instances -- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem -- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search -- Visualizing Privacy Implications of Access Control Policies in Social Network Systems -- Contextual Privacy Management in Extended Role Based Access Control Model -- Autonomous and Spontaneous Security -- Dynamic Security Rules for Geo Data -- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking -- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) -- Untraceable Tags Based on Mild Assumptions -- Security Threat Mitigation Trends in Low-Cost RFID Systems -- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification -- DDoS Defense Mechanisms: A New Taxonomy -- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems -- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. |
Record Nr. | UNINA-9910483479003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Protection in the Internet / / edited by Dário Moura Vicente, Sofia de Vasconcelos Casimiro |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (540 pages) |
Disciplina |
658.478
343.0999 |
Collana | Ius Comparatum - Global Studies in Comparative Law |
Soggetto topico |
Private international law
Conflict of laws Mass media Law Computers Law and legislation Computer security Private International Law, International & Foreign Law, Comparative Law IT Law, Media Law, Intellectual Property Legal Aspects of Computing Systems and Data Security |
ISBN | 3-030-28049-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Data Protection in the Internet: General Report -- Right to Privacy and Personal Data Protection in Brazilian Law -- Data Protection and the Internet: Canada -- Data Protection in the Internet: Cape Verde’s National Report -- National Report: Czech Republic -- Data Protection in the Internet: French Report -- Data Protection in the Internet: National Report Germany -- Data Protection in the Internet: Greece -- Italian National Report: Data Protection in the Internet -- Data Protection in the Internet: Japanese National Report -- Data Protection in the Internet: The Portuguese Case -- Data Protection Regulations: Overview of the Romanian Legislation and Deficiencies -- Singapore Report: Data Protection in the Internet -- Data Protection in the Internet: South Africa -- Data Protection in the Internet: National Report Spain -- Swiss Data Protection Law -- Data Protection in the United States: U.S. National Report -- Data Protection in the Internet: A European Union Perspective -- Data Protection in International Trade Law -- UN Regulations. |
Record Nr. | UNINA-9910366574203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Decision and Game Theory for Security [[electronic resource] ] : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xi, 584 pages) : illustrations |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Computers Law and legislation Application software Systems and Data Security Artificial Intelligence Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) |
ISBN | 3-030-32430-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. |
Record Nr. | UNISA-996466323303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Decision and Game Theory for Security : 10th International Conference, GameSec 2019, Stockholm, Sweden, October 30 – November 1, 2019, Proceedings / / edited by Tansu Alpcan, Yevgeniy Vorobeychik, John S. Baras, György Dán |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (xi, 584 pages) : illustrations |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Artificial intelligence Computer communication systems Computers Law and legislation Application software Systems and Data Security Artificial Intelligence Computer Communication Networks Legal Aspects of Computing Information Systems Applications (incl. Internet) |
ISBN | 3-030-32430-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Game theory, control, and mechanism design for security and privacy -- Decision making for cybersecurity and security requirements engineering -- Security and privacy for the Internet-of-Things, cyber-physical systems, cloud computing, resilient control systems, and critical infrastructure -- Pricing, economic incentives, security investments, and cyber insurance for dependable and secure systems -- Risk assessment and security risk management -- Security and privacy of wireless and mobile communications, including user location privacy -- Socio-technological and behavioral approaches to security -- Empirical and experimental studies with game, control, or optimization theory-based analysis for security and privacy -- Adversarial Machine Learning and the role of AI in system security. |
Record Nr. | UNINA-9910349271703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Den Tätern auf der Spur [[electronic resource] ] : Spannende Fälle aus IT-Sicherheit und IT-Forensik / / von Alexander Dörsam |
Autore | Dörsam Alexander |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 182 S. 7 Abb., 1 Abb. in Farbe.) |
Disciplina | 000 |
Soggetto topico |
Computer science
Computers Law and legislation Computer security Application software Popular Computer Science Legal Aspects of Computing Systems and Data Security Information Systems Applications (incl. Internet) |
ISBN | 3-658-16466-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Record Nr. | UNINA-9910484219703321 |
Dörsam Alexander
![]() |
||
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Designing for Privacy and its Legal Framework : Data Protection by Design and Default for the Internet of Things / / by Aurelia Tamò-Larrieux |
Autore | Tamò-Larrieux Aurelia |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (254 pages) |
Disciplina | 342.240858 |
Collana | Issues in Privacy and Data Protection |
Soggetto topico |
Law—Europe
Information technology—Law and legislation Mass media—Law and legislation Data protection—Law and legislation Computers—Law and legislation European Law IT Law, Media Law, Intellectual Property Privacy Legal Aspects of Computing |
ISBN | 3-319-98624-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Setting the Stage -- 2 Research Approach -- 3 Mapping the Privacy Rationales -- 4 Privacy Protection in an Internet of Things Environment -- 5 Privacy and Data Protection Regulation in Europe -- 6 Technical Tools and Designs for Data Protection -- 7 Mapping the Privacy Protection Tools throughout the Life Cycle of Data -- 8 Interplay of Legal and Technical Privacy Protection Tools -- 9 Privacy by Design for the Internet of Things: a Startup Scenario -- 10 Strengthening Privacy by Design -- 11 Conclusion. |
Record Nr. | UNINA-9910300058103321 |
Tamò-Larrieux Aurelia
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Computer organization Data encryption (Computer science) Software engineering Law and legislation Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Cryptology Software Engineering/Programming and Operating Systems Legal Aspects of Computing |
ISBN | 3-030-52683-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor. |
Record Nr. | UNISA-996418289503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings / / edited by Clémentine Maurice, Leyla Bilge, Gianluca Stringhini, Nuno Neves |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XII, 281 p. 234 illus., 60 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Computer organization Data encryption (Computer science) Software engineering Law and legislation Systems and Data Security Information Systems and Communication Service Computer Systems Organization and Communication Networks Cryptology Software Engineering/Programming and Operating Systems Legal Aspects of Computing |
ISBN | 3-030-52683-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Vulnerability Discovery and Analysis -- Automated CPE labeling of CVE summaries with Machine Learning -- Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks -- Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victim’s Perspective -- Attacks -- Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode -- HAEPG: An Automatic Multi-hop Exploitation Generation Framework -- Understanding Android VoIP Security: A System-level Vulnerability Assessment -- Web Security -- Web Runner 2049: Evaluating Third-Party Anti-bot Services -- Short Paper - Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers -- It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites -- On the Security of Application Installers & Online Software Repositories -- Detection and Containment -- Distributed Heterogeneous N-Variant Execution -- Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data -- Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor. |
Record Nr. | UNINA-9910413445303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 405 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society |
ISBN | 3-319-93411-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering. |
Record Nr. | UNISA-996465795703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Detection of Intrusions and Malware, and Vulnerability Assessment : 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings / / edited by Cristiano Giuffrida, Sébastien Bardin, Gregory Blanc |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 405 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Operating systems (Computers) Computers Law and legislation Computers and civilization Systems and Data Security Operating Systems Legal Aspects of Computing Computers and Society |
ISBN | 3-319-93411-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Malware analysis -- Mobile and embedded security -- Attacks -- Detection and containment -- Web and browser security -- Reverse engineering. |
Record Nr. | UNINA-9910349434403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|