top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.)
Disciplina 005.8
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Business information services
Security systems
Data and Information Security
Cybercrime
IT in Business
Security Science and Technology
ISBN 3-031-16088-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
Record Nr. UNISA-996547960403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Collaborative Approaches for Cyber Security in Cyber-Physical Systems / / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Collaborative Approaches for Cyber Security in Cyber-Physical Systems / / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.)
Disciplina 005.8
006.22
Collana Advanced Sciences and Technologies for Security Applications
Soggetto topico Data protection
Computer crimes
Business information services
Security systems
Data and Information Security
Cybercrime
IT in Business
Security Science and Technology
Objectes cooperants (Sistemes informàtics)
Seguretat informàtica
Soggetto genere / forma Llibres electrònics
ISBN 3-031-16088-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks.
Record Nr. UNINA-9910639892803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors)
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (VIII, 288 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Formal methods (Computer science)
Trust
ISBN 3-540-75227-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.
Record Nr. UNINA-9910484812903321
Berlin, Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors)
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (VIII, 288 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Formal methods (Computer science)
Trust
ISBN 3-540-75227-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.
Record Nr. UNISA-996465947503316
Berlin, Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (X, 259 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Information storage and retrieval
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
Management of Computing and Information Systems
Information Storage and Retrieval
ISBN 3-540-32629-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols.
Record Nr. UNISA-996466098103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers / / Theo Dimitrakos ... [et al.] (eds.)
Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers / / Theo Dimitrakos ... [et al.] (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (X, 259 p.)
Disciplina 005.8
Altri autori (Persone) DimitrakosTheo
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Formal methods (Computer science)
Trust
ISBN 3-540-32629-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols.
Altri titoli varianti FAST 2005
Record Nr. UNINA-9910485047703321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos
Trust Management [[electronic resource] ] : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIV, 382 p.)
Disciplina 004.24
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Information storage and retrieval
Computer communication systems
Application software
User interfaces (Computer systems)
Computers and civilization
Software Engineering/Programming and Operating Systems
Information Storage and Retrieval
Computer Communication Networks
Information Systems Applications (incl. Internet)
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 1-280-30717-X
9786610307173
3-540-24747-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Addresses -- Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services -- W5: The Five W’s of the World Wide Web -- Full Papers -- A Case for Evidence-Aware Distributed Reputation Systems -- Enhanced Reputation Mechanism for Mobile Ad Hoc Networks -- Pinocchio: Incentives for Honest Participation in Distributed Trust Management -- History-Based Signature or How to Trust Anonymous Documents -- Trading Privacy for Trust -- Supporting Privacy in Decentralized Additive Reputation Systems -- Engineering Trust Based Collaborations in a Global Computing Environment -- Analysing the Relationship between Risk and Trust -- Using Risk Analysis to Assess User Trust -- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities -- Requirements Engineering Meets Trust Management -- Towards Dynamic Security Perimeters for Virtual Collaborative Networks -- Human Experiments in Trust Dynamics -- Using Trust in Recommender Systems: An Experimental Analysis -- Modeling Controls for Dynamic Value Exchanges in Virtual Organizations -- Analyzing Correlation between Trust and User Similarity in Online Communities -- Trust Development and Management in Virtual Communities -- Managing Internet-Mediated Community Trust Relations -- Reasoning About Trust: A Formal Logical Framework -- Trust Mediation in Knowledge Management and Sharing -- Enhanced Accountability for Electronic Processes -- Short Papers and Experience Reports -- The Use of Formal Methods in the Analysis of Trust (Position Paper) -- Computing Recommendations to Trust -- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements -- Towards Trust Relationship Planning for Virtual Organizations -- Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision -- Deploying Trust Policies on the Semantic Web.
Record Nr. UNISA-996465566703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos
Trust Management : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIV, 382 p.)
Disciplina 004.24
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Information storage and retrieval
Computer communication systems
Application software
User interfaces (Computer systems)
Computers and civilization
Software Engineering/Programming and Operating Systems
Information Storage and Retrieval
Computer Communication Networks
Information Systems Applications (incl. Internet)
User Interfaces and Human Computer Interaction
Computers and Society
ISBN 1-280-30717-X
9786610307173
3-540-24747-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Addresses -- Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services -- W5: The Five W’s of the World Wide Web -- Full Papers -- A Case for Evidence-Aware Distributed Reputation Systems -- Enhanced Reputation Mechanism for Mobile Ad Hoc Networks -- Pinocchio: Incentives for Honest Participation in Distributed Trust Management -- History-Based Signature or How to Trust Anonymous Documents -- Trading Privacy for Trust -- Supporting Privacy in Decentralized Additive Reputation Systems -- Engineering Trust Based Collaborations in a Global Computing Environment -- Analysing the Relationship between Risk and Trust -- Using Risk Analysis to Assess User Trust -- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities -- Requirements Engineering Meets Trust Management -- Towards Dynamic Security Perimeters for Virtual Collaborative Networks -- Human Experiments in Trust Dynamics -- Using Trust in Recommender Systems: An Experimental Analysis -- Modeling Controls for Dynamic Value Exchanges in Virtual Organizations -- Analyzing Correlation between Trust and User Similarity in Online Communities -- Trust Development and Management in Virtual Communities -- Managing Internet-Mediated Community Trust Relations -- Reasoning About Trust: A Formal Logical Framework -- Trust Mediation in Knowledge Management and Sharing -- Enhanced Accountability for Electronic Processes -- Short Papers and Experience Reports -- The Use of Formal Methods in the Analysis of Trust (Position Paper) -- Computing Recommendations to Trust -- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements -- Towards Trust Relationship Planning for Virtual Organizations -- Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision -- Deploying Trust Policies on the Semantic Web.
Record Nr. UNINA-9910768462303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama
Trust Management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XII, 277 p. 53 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computers and civilization
Computer security
Computers
Computers and Society
Systems and Data Security
Information Systems and Communication Service
ISBN 3-319-18491-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reputation - from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe.
Record Nr. UNINA-9910299236403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui