top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Security and Trust Management [[electronic resource] ] : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Security and Trust Management [[electronic resource] ] : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 210 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
E-commerce
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
Cryptology
ISBN 3-319-11851-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.
Record Nr. UNISA-996199681703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 210 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
E-commerce
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
Cryptology
ISBN 3-319-11851-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.
Record Nr. UNINA-9910483369503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama
Trust Management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 277 p. 53 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computers and civilization
Computer security
Computers
Computers and Society
Systems and Data Security
Information Systems and Communication Service
ISBN 3-319-18491-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reputation - from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe.
Record Nr. UNINA-9910299236403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui