CCS '07 : proceedings of the 14th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 29-November 2, 2007 |
Autore | Ning Peng |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2007 |
Descrizione fisica | 1 online resource (612 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Computer and Communications Security '07 : proceedings of the 14th Association for Computing Machinery Conference on Computer and Communications Security : Alexandria, Virginia, United States of America, October 29-November 2, 2007
Proceedings of the 14th ACM Conference on Computer and Communications Security CCS '07 14th ACM Conference on Computer and Communications Security 2007, Alexandria, VA, USA - October 29 - November 02, 2007 |
Record Nr. | UNINA-9910376415403321 |
Ning Peng | ||
[Place of publication not identified], : ACM, 2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CCS 2006 : proceedings of the 13th ACM Conference on Computer and Communications Security : October 30-November 3, 2006, Alexandria, Virginia, USA |
Pubbl/distr/stampa | [Place of publication not identified], : ACM Press, 2006 |
Descrizione fisica | 1 online resource (434 p.;) |
Disciplina | 005.8 |
Collana | ACM Conferences |
Soggetto topico |
Computer security - Security measures
Telecommunication systems Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | CCS '06 |
Record Nr. | UNINA-9910376498303321 |
[Place of publication not identified], : ACM Press, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Database management Management information systems Computer science Computers and civilization Cryptology Computer Communication Networks Operating Systems Database Management Management of Computing and Information Systems Computers and Society |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols. |
Record Nr. | UNISA-996465615003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 516 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Database management Management information systems Computer science Computers and civilization Cryptology Computer Communication Networks Operating Systems Database Management Management of Computing and Information Systems Computers and Society |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols. |
Record Nr. | UNINA-9910484150903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XV, 319 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computers and civilization Computer communication systems Operating systems (Computers) Application software Management of Computing and Information Systems Cryptology Computers and Society Computer Communication Networks Operating Systems Information Systems Applications (incl. Internet) |
ISBN | 3-642-28879-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros
Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme / Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg. |
Record Nr. | UNISA-996466249203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Dependability in Sensor, Cloud, and Big Data Systems and Applications [[electronic resource] ] : 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVIII, 488 p. 175 illus., 126 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Computer communication systems Special purpose computers Architecture, Computer Coding theory Information theory Database management Systems and Data Security Computer Communication Networks Special Purpose and Application-Based Systems Computer System Implementation Coding and Information Theory Database Management |
ISBN | 981-15-1304-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Dependability and Security Fundamentals and Technologies -- Dependable and Secure Systems -- Dependable and Secure Applications -- Dependability and Security Measures and Assessments -- Explainable Artificial Inteligence for Cyberspace. |
Record Nr. | UNINA-9910357849003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Systems Security and Privacy Protection [[electronic resource] ] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVI, 586 p. 159 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computer security
Data encryption (Computer science) Application software Computers and civilization Computers Law and legislation Systems and Data Security Cryptology Information Systems Applications (incl. Internet) Computers and Society Legal Aspects of Computing Computer Applications |
ISBN | 3-319-58469-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910254814303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the ACM Workshop on Privacy in the Electronic Society : November 21, 2002, Washington, DC, USA : (in association with 9th ACM Conference on Computer and Communications Security |
Autore | Jajodia Sushil |
Pubbl/distr/stampa | [Place of publication not identified], : Association for Computing Machinery, 2003 |
Descrizione fisica | 1 online resource (115 p.;) |
Disciplina | 005.8 |
Collana | ACM Conferences |
Soggetto topico |
Computer security
Engineering & Applied Sciences Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | WPES '02 |
Record Nr. | UNINA-9910375828803321 |
Jajodia Sushil | ||
[Place of publication not identified], : Association for Computing Machinery, 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 195 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Systems and Data Security |
ISBN | 3-642-40012-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. |
Record Nr. | UNISA-996465954403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 195 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Computer security Computer Communication Networks Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Systems and Data Security |
ISBN | 3-642-40012-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures. |
Record Nr. | UNINA-9910483163603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|