Collaborative Approaches for Cyber Security in Cyber-Physical Systems [[electronic resource] /] / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.) |
Disciplina | 005.8 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer crimes Business information services Security systems Data and Information Security Cybercrime IT in Business Security Science and Technology |
ISBN | 3-031-16088-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks. |
Record Nr. | UNISA-996547960403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Collaborative Approaches for Cyber Security in Cyber-Physical Systems / / edited by Theo Dimitrakos, Javier Lopez, Fabio Martinelli |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (XII, 226 p. 65 illus., 48 illus. in color.) |
Disciplina |
005.8
006.22 |
Collana | Advanced Sciences and Technologies for Security Applications |
Soggetto topico |
Data protection
Computer crimes Business information services Security systems Data and Information Security Cybercrime IT in Business Security Science and Technology Objectes cooperants (Sistemes informàtics) Seguretat informàtica |
Soggetto genere / forma | Llibres electrònics |
ISBN | 3-031-16088-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Collaborative and confidential architectures for information sharing and analytics -- 2. Secure Interconnection of large-scale CPS-based frameworks and middleware -- 3. Virtualized security-awareness systems and digital twins -- 4. Empirical evaluation of system vulnerabilities -- 5. Collaborative physical and cyber defense requirements -- 6. Heterogeneous data centric security policies specification and enforcement -- 7. Big data for anomaly and advanced threats detection -- 8. Collaborative identification and ranking of malware -- 9. Visual analytics techniques for cyber security -- 10. Collaborative mitigation methodologies against advanced and persistent attacks. |
Record Nr. | UNINA-9910639892803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (VIII, 288 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Formal methods (Computer science) Trust |
ISBN | 3-540-75227-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. |
Record Nr. | UNINA-9910484812903321 |
Berlin, Heidelberg : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal aspects in security and trust : Fourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers / / Theo Dimitrakos [and three others] (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (VIII, 288 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Formal methods (Computer science) Trust |
ISBN | 3-540-75227-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. |
Record Nr. | UNISA-996465947503316 |
Berlin, Heidelberg : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal Aspects in Security and Trust [[electronic resource] ] : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y.A. Ryan, Steve Schneider |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (X, 259 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Operating systems (Computers) Computers and civilization Management information systems Computer science Information storage and retrieval Computer Communication Networks Cryptology Operating Systems Computers and Society Management of Computing and Information Systems Information Storage and Retrieval |
ISBN | 3-540-32629-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols. |
Record Nr. | UNISA-996466098103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal aspects in security and trust : third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers / / Theo Dimitrakos ... [et al.] (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (X, 259 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | DimitrakosTheo |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer security
Formal methods (Computer science) Trust |
ISBN | 3-540-32629-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Voting Technologies and Trust -- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol -- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks -- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols -- Eliminating Implicit Information Leaks by Transformational Typing and Unification -- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations -- Opacity Generalised to Transition Systems -- Unifying Decidability Results on Protection Systems Using Simulations -- Proof Obligations Preserving Compilation -- A Logic for Analysing Subterfuge in Delegation Chains -- Probable Innocence Revisited -- Relative Trustworthiness -- Secure Untrusted Binaries — Provably! -- Normative Specification: A Tool for Trust and Security -- Type-Based Distributed Access Control vs. Untyped Attackers -- A Security Management Information Model Derivation Framework: From Goals to Configurations -- On Anonymity with Identity Escrow -- Towards Verification of Timed Non-repudiation Protocols. |
Altri titoli varianti | FAST 2005 |
Record Nr. | UNINA-9910485047703321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management [[electronic resource] ] : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIV, 382 p.) |
Disciplina | 004.24 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Information storage and retrieval Computer communication systems Application software User interfaces (Computer systems) Computers and civilization Software Engineering/Programming and Operating Systems Information Storage and Retrieval Computer Communication Networks Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Computers and Society |
ISBN |
1-280-30717-X
9786610307173 3-540-24747-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Addresses -- Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services -- W5: The Five W’s of the World Wide Web -- Full Papers -- A Case for Evidence-Aware Distributed Reputation Systems -- Enhanced Reputation Mechanism for Mobile Ad Hoc Networks -- Pinocchio: Incentives for Honest Participation in Distributed Trust Management -- History-Based Signature or How to Trust Anonymous Documents -- Trading Privacy for Trust -- Supporting Privacy in Decentralized Additive Reputation Systems -- Engineering Trust Based Collaborations in a Global Computing Environment -- Analysing the Relationship between Risk and Trust -- Using Risk Analysis to Assess User Trust -- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities -- Requirements Engineering Meets Trust Management -- Towards Dynamic Security Perimeters for Virtual Collaborative Networks -- Human Experiments in Trust Dynamics -- Using Trust in Recommender Systems: An Experimental Analysis -- Modeling Controls for Dynamic Value Exchanges in Virtual Organizations -- Analyzing Correlation between Trust and User Similarity in Online Communities -- Trust Development and Management in Virtual Communities -- Managing Internet-Mediated Community Trust Relations -- Reasoning About Trust: A Formal Logical Framework -- Trust Mediation in Knowledge Management and Sharing -- Enhanced Accountability for Electronic Processes -- Short Papers and Experience Reports -- The Use of Formal Methods in the Analysis of Trust (Position Paper) -- Computing Recommendations to Trust -- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements -- Towards Trust Relationship Planning for Virtual Organizations -- Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision -- Deploying Trust Policies on the Semantic Web. |
Record Nr. | UNISA-996465566703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust Management : Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings / / edited by Christian Jensen, Stefan Poslad, Theo Dimitrakos |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XIV, 382 p.) |
Disciplina | 004.24 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Software engineering
Information storage and retrieval Computer communication systems Application software User interfaces (Computer systems) Computers and civilization Software Engineering/Programming and Operating Systems Information Storage and Retrieval Computer Communication Networks Information Systems Applications (incl. Internet) User Interfaces and Human Computer Interaction Computers and Society |
ISBN |
1-280-30717-X
9786610307173 3-540-24747-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Addresses -- Addressing the Data Problem: The Legal Framework Governing Forensics in an Online Environment -- KAoS: A Policy and Domain Services Framework for Grid Computing and Semantic Web Services -- W5: The Five W’s of the World Wide Web -- Full Papers -- A Case for Evidence-Aware Distributed Reputation Systems -- Enhanced Reputation Mechanism for Mobile Ad Hoc Networks -- Pinocchio: Incentives for Honest Participation in Distributed Trust Management -- History-Based Signature or How to Trust Anonymous Documents -- Trading Privacy for Trust -- Supporting Privacy in Decentralized Additive Reputation Systems -- Engineering Trust Based Collaborations in a Global Computing Environment -- Analysing the Relationship between Risk and Trust -- Using Risk Analysis to Assess User Trust -- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities -- Requirements Engineering Meets Trust Management -- Towards Dynamic Security Perimeters for Virtual Collaborative Networks -- Human Experiments in Trust Dynamics -- Using Trust in Recommender Systems: An Experimental Analysis -- Modeling Controls for Dynamic Value Exchanges in Virtual Organizations -- Analyzing Correlation between Trust and User Similarity in Online Communities -- Trust Development and Management in Virtual Communities -- Managing Internet-Mediated Community Trust Relations -- Reasoning About Trust: A Formal Logical Framework -- Trust Mediation in Knowledge Management and Sharing -- Enhanced Accountability for Electronic Processes -- Short Papers and Experience Reports -- The Use of Formal Methods in the Analysis of Trust (Position Paper) -- Computing Recommendations to Trust -- Picking Battles: The Impact of Trust Assumptions on the Elaboration of Security Requirements -- Towards Trust Relationship Planning for Virtual Organizations -- Trust, Security, and Contract Management Challenges for Grid-Based Application Service Provision -- Deploying Trust Policies on the Semantic Web. |
Record Nr. | UNINA-9910768462303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management IX : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 277 p. 53 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computers and civilization
Computer security Computers Computers and Society Systems and Data Security Information Systems and Communication Service |
ISBN | 3-319-18491-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Reputation - from Social Perception to Internet Security -- Mathematical Modelling of Trust Issues in Federated Identity Management -- Simple and Practical Integrity Models for Binaries and Files -- Enabling NAME-Based Security and Trust -- Trust Driven Strategies for Privacy by Design -- Lightweight Practical Private One-Way Anonymous Messaging -- Privacy-Preserving Reputation Mechanism: A Usable Solution Handling Negative Ratings -- Obscuring Provenance Confidential Information via Graph Transformation -- Social Network Culture Needs the Lens of Critical Trust Research -- Predicting Quality of Crowd sourced Annotations Using Graph Kernels -- An Architecture for Trustworthy Open Data Services -- 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space -- Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation -- The Detail of Trusted Messages: Retweets in a Context of Health and Fitness -- Reusable Defense Components for Online Reputation Systems -- Continuous Context-Aware Device Comfort Evaluation Method -- Special Session: Toward Trusted Cloud Ecosystems -- Foreword: Towards Trusted Cloud Ecosystems -- A Cloud Orchestrator for Deploying Public Services on the Cloud – The Case of STRATEGIC Project -- Integrating Security Services in Cloud Service Stores -- Building an Eco-System of Trusted Services via User Control and Transparency on Personal Data -- Security-as-a-Service in Multi-cloud and Federated Cloud Environments -- The Role of SLAs in Building a Trusted Cloud for Europe. |
Record Nr. | UNINA-9910299236403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|