Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers / / edited by Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XIV, 333 p. 100 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Management information systems Computer science Data encryption (Computer science) E-commerce Computer communication systems Information storage and retrieval Systems and Data Security Management of Computing and Information Systems Cryptology e-Commerce/e-business Computer Communication Networks Information Storage and Retrieval |
ISBN | 3-642-35889-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management. |
Record Nr. | UNISA-996465995803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Physical Layer Security in Power Line Communications : Fundamentals, Models and Applications / / by Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro |
Autore | Hernandez Fernandez Javier |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (151 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
OmriAymen
Di PietroRoberto |
Collana | Advances in Information Security |
Soggetto topico |
Computer networks - Security measures
Data protection - Law and legislation Telecommunication Mobile and Network Security Privacy Communications Engineering, Networks |
ISBN |
9783031573491
9783031573484 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter.1.Introduction -- Chapter.2.An Overview of Power Line Communication Networks -- Chapter.3.Power Line Communication Channel Characteristics -- Chapter.4.Power Line Communication Security -- Chapter.5.Physical Layer Security in Power Line Communications -- Chapter.6.Performance Analysis of Data Transmission Security and Reliability in PLC -- Chapter.7.Confidentiality Technique for PLC Networks -- Chapter.8.Authentication Method for PLC Network -- Chapter.9.PLC Network Integrity Solution.-Chapter.10.PLC Availability Scheme -- Chapter.11.Conclusions. |
Record Nr. | UNINA-9910872183003321 |
Hernandez Fernandez Javier | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Autore | Colantonio Alessandro |
Pubbl/distr/stampa | Singapore, : World Scientific Pub. Co., 2012 |
Descrizione fisica | 1 online resource (295 p.) |
Disciplina | 006.312 |
Altri autori (Persone) |
Di PietroRoberto
OcelloAlberto |
Soggetto topico | Computer networks - Access control |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-66963-2
9786613646569 981-4366-15-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs 2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach 5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining 6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC 7.1 A Cost-Driven Approach to Role Engineering |
Record Nr. | UNINA-9910451601403321 |
Colantonio Alessandro | ||
Singapore, : World Scientific Pub. Co., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Autore | Colantonio Alessandro |
Pubbl/distr/stampa | Singapore, : World Scientific Pub. Co., 2012 |
Descrizione fisica | 1 online resource (295 p.) |
Disciplina | 006.312 |
Altri autori (Persone) |
Di PietroRoberto
OcelloAlberto |
Soggetto topico | Computer networks - Access control |
ISBN |
1-280-66963-2
9786613646569 981-4366-15-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs 2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach 5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining 6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC 7.1 A Cost-Driven Approach to Role Engineering |
Record Nr. | UNINA-9910779013003321 |
Colantonio Alessandro | ||
Singapore, : World Scientific Pub. Co., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Role mining in business : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Autore | Colantonio Alessandro |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore, : World Scientific Pub. Co., 2012 |
Descrizione fisica | 1 online resource (295 p.) |
Disciplina | 006.312 |
Altri autori (Persone) |
Di PietroRoberto
OcelloAlberto |
Soggetto topico | Computer networks - Access control |
ISBN |
1-280-66963-2
9786613646569 981-4366-15-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs 2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach 5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining 6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC 7.1 A Cost-Driven Approach to Role Engineering |
Record Nr. | UNINA-9910823327003321 |
Colantonio Alessandro | ||
Singapore, : World Scientific Pub. Co., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 369 p. 111 illus.) |
Disciplina | 621.382/1 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Computer security
Management information systems Computer science Computers and civilization Computer communication systems Data encryption (Computer science) Application software Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Communication Networks Cryptology Information Systems Applications (incl. Internet) |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-36883-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy. |
Record Nr. | UNINA-9910739401503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|