top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CCS '07 : proceedings of the 14th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 29-November 2, 2007
CCS '07 : proceedings of the 14th ACM Conference on Computer and Communications Security : Alexandria, Virginia, USA, October 29-November 2, 2007
Autore Ning Peng
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2007
Descrizione fisica 1 online resource (612 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer and Communications Security '07 : proceedings of the 14th Association for Computing Machinery Conference on Computer and Communications Security : Alexandria, Virginia, United States of America, October 29-November 2, 2007
Proceedings of the 14th ACM Conference on Computer and Communications Security
CCS '07
14th ACM Conference on Computer and Communications Security 2007, Alexandria, VA, USA - October 29 - November 02, 2007
Record Nr. UNINA-9910376415403321
Ning Peng  
[Place of publication not identified], : ACM, 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CCS 2006 : proceedings of the 13th ACM Conference on Computer and Communications Security : October 30-November 3, 2006, Alexandria, Virginia, USA
CCS 2006 : proceedings of the 13th ACM Conference on Computer and Communications Security : October 30-November 3, 2006, Alexandria, Virginia, USA
Pubbl/distr/stampa [Place of publication not identified], : ACM Press, 2006
Descrizione fisica 1 online resource (434 p.;)
Disciplina 005.8
Collana ACM Conferences
Soggetto topico Computer security - Security measures
Telecommunication systems
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti CCS '06
Record Nr. UNINA-9910376498303321
[Place of publication not identified], : ACM Press, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Management information systems
Computer science
Computers and civilization
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Management of Computing and Information Systems
Computers and Society
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols.
Record Nr. UNISA-996465615003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Computer Security - ESORICS 2005 [[electronic resource] ] : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings / / edited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XII, 516 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Database management
Management information systems
Computer science
Computers and civilization
Cryptology
Computer Communication Networks
Operating Systems
Database Management
Management of Computing and Information Systems
Computers and Society
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols.
Record Nr. UNINA-9910484150903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati
Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XV, 319 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Computers and civilization
Computer communication systems
Operating systems (Computers)
Application software
Management of Computing and Information Systems
Cryptology
Computers and Society
Computer Communication Networks
Operating Systems
Information Systems Applications (incl. Internet)
ISBN 3-642-28879-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros
Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme /
Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg.
Record Nr. UNISA-996466249203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Dependability in Sensor, Cloud, and Big Data Systems and Applications [[electronic resource] ] : 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren
Dependability in Sensor, Cloud, and Big Data Systems and Applications [[electronic resource] ] : 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings / / edited by Guojun Wang, Md Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVIII, 488 p. 175 illus., 126 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Computer communication systems
Special purpose computers
Architecture, Computer
Coding theory
Information theory
Database management
Systems and Data Security
Computer Communication Networks
Special Purpose and Application-Based Systems
Computer System Implementation
Coding and Information Theory
Database Management
ISBN 981-15-1304-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Dependability and Security Fundamentals and Technologies -- Dependable and Secure Systems -- Dependable and Secure Applications -- Dependability and Security Measures and Assessments -- Explainable Artificial Inteligence for Cyberspace.
Record Nr. UNINA-9910357849003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Systems Security and Privacy Protection [[electronic resource] ] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli
ICT Systems Security and Privacy Protection [[electronic resource] ] : 32nd IFIP TC 11 International Conference, SEC 2017, Rome, Italy, May 29-31, 2017, Proceedings / / edited by Sabrina De Capitani di Vimercati, Fabio Martinelli
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVI, 586 p. 159 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Computers and civilization
Computers
Law and legislation
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Computers and Society
Legal Aspects of Computing
Computer Applications
ISBN 3-319-58469-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254814303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the ACM Workshop on Privacy in the Electronic Society : November 21, 2002, Washington, DC, USA : (in association with 9th ACM Conference on Computer and Communications Security
Proceedings of the ACM Workshop on Privacy in the Electronic Society : November 21, 2002, Washington, DC, USA : (in association with 9th ACM Conference on Computer and Communications Security
Autore Jajodia Sushil
Pubbl/distr/stampa [Place of publication not identified], : Association for Computing Machinery, 2003
Descrizione fisica 1 online resource (115 p.;)
Disciplina 005.8
Collana ACM Conferences
Soggetto topico Computer security
Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti WPES '02
Record Nr. UNINA-9910375828803321
Jajodia Sushil  
[Place of publication not identified], : Association for Computing Machinery, 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 195 p. 30 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Systems and Data Security
ISBN 3-642-40012-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures.
Record Nr. UNISA-996465954403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell
Public Key Infrastructures, Services and Applications [[electronic resource] ] : 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Sabrina De Capitani di Vimercati, Chris Mitchell
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 195 p. 30 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Computers and civilization
Computer security
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Systems and Data Security
ISBN 3-642-40012-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Schemas and Protocols -- Efficient Public Key Encryption Admitting Decryption by Sender -- Public Key Infrastructure -- How to Avoid the Breakdown of Public Key Infrastructures Forward Secure Signatures for Certificate Authorities -- Personal PKI for the Smart Device Era -- The Notary Based PKI -- Wireless Authentication and Revocation How to Bootstrap Trust Among Devices in Wireless Environments via EAP-STLS -- Anonymity Revocation through Standard Infrastructures.
Record Nr. UNINA-9910483163603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui