top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers / / edited by Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers / / edited by Roberto Di Pietro, Javier Herranz, Ernesto Damiani, Radu State
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 333 p. 100 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Management information systems
Computer science
Data encryption (Computer science)
E-commerce
Computer communication systems
Information storage and retrieval
Systems and Data Security
Management of Computing and Information Systems
Cryptology
e-Commerce/e-business
Computer Communication Networks
Information Storage and Retrieval
ISBN 3-642-35889-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Location privacy -- Citizens' privacy -- Privacy -- Authentication with anonymity -- Privacy in distributed systems -- Privacy policies -- Automated privacy enforcement.- Run-time enforcement in process and service security -- Security policy deployment -- Distributed intrusion detection -- Autonomous and spontaneous response -- Privacy policies -- Secure localization -- Context aware and ubiquitous computing -- Identity management.
Record Nr. UNISA-996465995803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Physical Layer Security in Power Line Communications : Fundamentals, Models and Applications / / by Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro
Physical Layer Security in Power Line Communications : Fundamentals, Models and Applications / / by Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro
Autore Hernandez Fernandez Javier
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (151 pages)
Disciplina 005.8
Altri autori (Persone) OmriAymen
Di PietroRoberto
Collana Advances in Information Security
Soggetto topico Computer networks - Security measures
Data protection - Law and legislation
Telecommunication
Mobile and Network Security
Privacy
Communications Engineering, Networks
ISBN 9783031573491
9783031573484
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter.1.Introduction -- Chapter.2.An Overview of Power Line Communication Networks -- Chapter.3.Power Line Communication Channel Characteristics -- Chapter.4.Power Line Communication Security -- Chapter.5.Physical Layer Security in Power Line Communications -- Chapter.6.Performance Analysis of Data Transmission Security and Reliability in PLC -- Chapter.7.Confidentiality Technique for PLC Networks -- Chapter.8.Authentication Method for PLC Network -- Chapter.9.PLC Network Integrity Solution.-Chapter.10.PLC Availability Scheme -- Chapter.11.Conclusions.
Record Nr. UNINA-9910872183003321
Hernandez Fernandez Javier  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Autore Colantonio Alessandro
Pubbl/distr/stampa Singapore, : World Scientific Pub. Co., 2012
Descrizione fisica 1 online resource (295 p.)
Disciplina 006.312
Altri autori (Persone) Di PietroRoberto
OcelloAlberto
Soggetto topico Computer networks - Access control
Soggetto genere / forma Electronic books.
ISBN 1-280-66963-2
9786613646569
981-4366-15-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs
2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach
5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining
6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC
7.1 A Cost-Driven Approach to Role Engineering
Record Nr. UNINA-9910451601403321
Colantonio Alessandro  
Singapore, : World Scientific Pub. Co., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Role mining in business [[electronic resource] ] : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Autore Colantonio Alessandro
Pubbl/distr/stampa Singapore, : World Scientific Pub. Co., 2012
Descrizione fisica 1 online resource (295 p.)
Disciplina 006.312
Altri autori (Persone) Di PietroRoberto
OcelloAlberto
Soggetto topico Computer networks - Access control
ISBN 1-280-66963-2
9786613646569
981-4366-15-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs
2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach
5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining
6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC
7.1 A Cost-Driven Approach to Role Engineering
Record Nr. UNINA-9910779013003321
Colantonio Alessandro  
Singapore, : World Scientific Pub. Co., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Role mining in business : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Role mining in business : taming role-based access control administration / / Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello
Autore Colantonio Alessandro
Edizione [1st ed.]
Pubbl/distr/stampa Singapore, : World Scientific Pub. Co., 2012
Descrizione fisica 1 online resource (295 p.)
Disciplina 006.312
Altri autori (Persone) Di PietroRoberto
OcelloAlberto
Soggetto topico Computer networks - Access control
ISBN 1-280-66963-2
9786613646569
981-4366-15-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 4.2 Understanding Access Control Data; 4.3 Data Preparation; 4.4 Role Definition; 4.5 Final Remarks; Fundamentals; 1. Managing Access Rights; 1.1 Challenges of Controlling Access; 1.2 Access Control Concepts; 1.2.1 Policies, Models, and Mechanisms; 1.2.2 Permissions, Operations, and Objects; 1.2.3 Authentication and Authorization; 1.2.4 User Life-Cycle Management and Provisioning; 1.2.5 Overentitlement and Underentitlement; 1.3 Access Control Models; 1.3.1 Access Control Lists; 1.3.2 Discretionary Access Control; 1.3.3 Mandatory Access Control
1.3.4 Attribute-Based Access Control1.4 Final Remarks; 2. Role-Based Access Control; 2.1 RBAC Basics; 2.2 RBAC Standards; 2.2.1 Core RBAC; 2.2.2 Hierarchical RBAC; 2.2.3 Static Separation of Duties (SSD) RBAC; 2.2.4 Dynamic Separation of Duties (DSD) RBAC; 2.3 Advantages of RBAC; 2.3.1 Efficient Policy Maintenance and Certification; 2.3.2 Efficient Provisioning; 2.3.3 Reduction in New Employee Downtime; 2.3.4 Enhanced System Security; 2.3.5 Enhanced Organizational Productivity; 2.4 Obstacles to Migrating to RBAC; 2.4.1 Role Engineering; 2.4.2 Migration Costs
2.4.3 Systems Structure and Interoperability2.4.4 Product Acceptance and Comparison; 2.5 Final Remarks; 3. Role Engineering; 3.1 Modeling Roles; 3.2 Role Engineering Approaches; 3.2.1 Top-Down; 3.2.2 Bottom-Up; 3.3 Parts of a Role Engineering Task; 3.4 Guidelines; 3.5 Final Remarks; 4. A Step-to-Step Methodology for Role Mining; 4.1 Role Mining Steps; 5. The Hidden Structure of Roles; 5.1 Formalization of the Role Mining Problem; 5.2 Graph-Based Approach; 5.2.1 Graph Theory Basics; 5.2.2 Role Mining and Graph-Related Problems; 5.3 Matrix-Based Approach
5.3.1 Role Mining and Binary Matrix Factorization5.3.2 Pseudo-Roles; 5.3.3 Relevance of Maximal Pseudo-Roles; 5.3.4 Fast Computation of Maximal Pseudo-Roles; 5.4 Permission-Powerset Lattice; 5.4.1 Posets, Lattices, Hasse Diagrams, and Graphs; 5.4.2 Mapping Permission Patterns to Roles; 5.4.3 Finding Redundancies; 5.5 Final Remarks; Pattern Identification in Users' Entitlements; 6. Enumerating Candidate Roles; 6.1 Eliciting Patterns From Access Data; 6.1.1 Clustering Techniques; 6.1.1.1 Categorization of Clustering Methods; 6.1.1.2 ORCA: A Hierarchical Clustering for Role Mining
6.1.2 Frequent Itemsets6.1.2.1 Definitions; 6.1.2.2 The Algorithm Apriori; 6.1.2.3 Generating Association Rules; 6.1.2.4 Closed Itemset Mining; 6.1.2.5 CompleteMiner: Enumeration of Closed Permission-Sets; 6.2 Minimizing the Number of Roles; 6.2.1 A Graph Reduction for Role Minimization; 6.2.2 Optimal Boolean Matrix Decomposition; 6.3 Estimating the Minimum Number of Roles; 6.3.1 Martingales and Azuma-Hoe.ding Inequality; 6.3.2 A Concentration Result for Number of Roles; 6.3.3 Applications of the Bound; 6.4 Final Remarks; 7. Minimizing the Effort of Administering RBAC
7.1 A Cost-Driven Approach to Role Engineering
Record Nr. UNINA-9910823327003321
Colantonio Alessandro  
Singapore, : World Scientific Pub. Co., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro
Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers / / edited by Angelos D. Keromytis, Roberto Di Pietro
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 369 p. 111 illus.)
Disciplina 621.382/1
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer security
Management information systems
Computer science
Computers and civilization
Computer communication systems
Data encryption (Computer science)
Application software
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Computer Communication Networks
Cryptology
Information Systems Applications (incl. Internet)
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36883-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Crypto and electronic money -- Wireless security -- Web security -- Intrusion detection and monitoring -- Anonymity and privacy.
Record Nr. UNINA-9910739401503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui