top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Policies and Research in Identity Management : Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings / / edited by Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell
Policies and Research in Identity Management : Third IFIP WG 11.6 Working Conference, IDMAN 2013, London, UK, April 8-9, 2013, Proceedings / / edited by Simone Fischer-Hübner, Elisabeth de Leeuw, Chris J. Mitchell
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 161 p. 34 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Biometric identification
Computers, Special purpose
Electronic data processing - Management
Data and Information Security
Cryptology
Biometrics
Special Purpose and Application-Based Systems
IT Operations
ISBN 3-642-37282-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Towards Practical Attribute-Based Identity Management: The IRMA -- Data Protection by Default in Identity-Related Applications -- Privacy-Friendly Checking of Remote Token Blacklists -- Concepts and Languages for Privacy-Preserving Attribute-Based Authentication -- Efficient Selective Disclosure on Smart Cards Using Idemix -- Identity Management and Integrity Protection in Publish-Subscribe Systems.-Extended HTTP Digest Access Authentication -- Executable Model-Based Risk Assessment Method for Identity Management Systems -- Privacy Risk Analysis is about Understanding Conflicting Incentives -- Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals -- The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions -- Extending EMV Payment Smart Cards with Biometric On-Card Verification -- Dynamic Identity Federation Using Security Assertion Markup Language (SAML) -- Logout in Single Sign-on Systems.
Record Nr. UNINA-9910741142403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management for the Future Internet in the Age of Globalisation : 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / / edited by Jan Camenisch, Simone Fischer-Hübner, Marit Hansen
Privacy and Identity Management for the Future Internet in the Age of Globalisation : 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / / edited by Jan Camenisch, Simone Fischer-Hübner, Marit Hansen
Pubbl/distr/stampa Heidelberg : , : Srpinger, , 2015
Descrizione fisica 1 recurso en línea (X, 267 p. 44 illus.)
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Electronic data processing - Management
Computers and civilization
Protección de la información (Informática)
Sistemas de información
Internet (Red informática) - Derecho y legislación
Data and Information Security
IT Operations
Computers and Society
ISBN 3-319-18621-3
9783319186207
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life -- Towards an Engineering Model of Privacy-Related Decisions -- The Value of Personal Data -- Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model -- Privacy and Confidentiality in Service Science and Big Data Analytics -- The Court of Justice of the European Union, Data Retention and the Rights to Data Protection and Privacy – Where Are We Now? -- EUROSUR – A Sci-fi Border Zone Patrolled by Drones? -- Anonymous e Petitions – Another Step Towards e Democracy -- A Brief Evaluation of Icons in the First Reading of the European Parliament on COM (2012) 0011 -- Privacy by Design – The Case of Automated Border Control -- Patterns in Privacy - A Pattern-Based Approach for Assessments -- A Survey on Multimodal Biometrics and the Protection of Their Templates -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Blank Digital Signatures: Optimization and Practical Experiences -- Tools for Cloud Accountability: A4Cloud Tutorial -- Privacy for Peer Profiling in Collective Adaptive Systems -- ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use and Legal Issues.
Record Nr. UNINA-9910299228903321
Heidelberg : , : Srpinger, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab
Privacy and Identity Management. Facing up to Next Steps : 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers / / edited by Anja Lehmann, Diane Whitehouse, Simone Fischer-Hübner, Lothar Fritsch, Charles Raab
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 279 p. 31 illus.)
Disciplina 005.8
Collana IFIP AICT Tutorials
Soggetto topico Computer security
Data protection
Management information systems
Computer science
Application software
Computers and civilization
Systems and Data Security
Security
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-319-55783-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Big Data -- Big Data Privacy and Anonymization -- Data Protection by Design and by Default à la European General Data Protection Regulation -- Evaluating Websites and Their Adherence to Data Protection Principles: Tools and Experiences -- Privacy in the Human Brain Project: The Perspective of Ethics Management -- Smart Cars Cruising on the Road Paved with Good Intentions? Workshop on Big Data Applications and Individual Rights under the New European General Data Protection Regulation.-Opportunities and Challenges of CREDENTIAL -- Co-development of RRI Framework to Emphasize Privacy and Data Protection -- Evidence-Based Methods for Privacy and Identity Management -- Enforcing Data Protection Law: the Role of the Supervisory Authorities in Theory and Practice -- Not Just User Control in the General Data Protection Regulation. On the Problems with Choice and Paternalism, and on the Point of Data Protection -- Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? -- Cloud Computing Contracts Regulatory Issues and Cloud Service Providers' Offers: An Analysis -- Using Differential Privacy for the Internet of Things -- Implicit Bias in Predictive Data Profiling within Recruitments -- A Survey of Security Analysis in Federated Identity Management -- The Impact of Users' Affect States on Privacy Concern -- Privacy Salience: Taxonomies and Research Opportunities.
Record Nr. UNINA-9910254998803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers / / edited by Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn
Privacy and Identity Management. Fairness, Accountability, and Transparency in the Age of Big Data : 13th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Vienna, Austria, August 20-24, 2018, Revised Selected Papers / / edited by Eleni Kosta, Jo Pierson, Daniel Slamanig, Simone Fischer-Hübner, Stephan Krenn
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 291 p. 175 illus., 29 illus. in color.)
Disciplina 005.8
Collana IFIP AICT Tutorials
Soggetto topico Computer security
Computers
Application software
User interfaces (Computer systems)
Artificial intelligence
Systems and Data Security
Computing Milieux
Information Systems Applications (incl. Internet)
User Interfaces and Human Computer Interaction
Computer Appl. in Social and Behavioral Sciences
Artificial Intelligence
ISBN 3-030-16744-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Causal Bayesian Networks Viewpoint on Fairness -- Sharing is caring, a boundary object approach to mapping and discussing personal data processing -- Who You Gonna Call When There's Something Wrong in Your Processing? Risk Assessment and Data Breach Notications in Practice -- Design and Security Assessment of Usable Multi-Factor Authentication and Single Sign-On Solutions for Mobile Applications: A Workshop Experience Report -- Towards Empowering the Human for Privacy Online -- Trust and Distrust: On Sense and Nonsense in Big Data -- GDPR transparency requirements and data privacy vocabularies -- Glycos: the basis for a peer-to-peer, private online social network -- GDPR and the Concept of Risk: The Role of risk, the Scope of risk and the technology involved -- Privacy Patterns for Pseudonymity -- Implementing GDPR in the Charity Sector: A Case Study -- Me and My Robot! Sharing Information with a New Friend -- chownIoT: Enhancing IoT Privacy by Automated Handling of Ownership Change -- Is Privacy Controllable? -- Assessing Theories for Research on Personal Data Transparency -- Data Protection by Design for cross-border electronic identication: does the eIDAS Interoperability Framework need to be modernised? -- Risk proling by law enforcement agencies in the Big Data era: Is there a need for transparency?
Record Nr. UNINA-9910337860503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers / / edited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner
Privacy and Identity Management. The Smart Revolution : 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers / / edited by Marit Hansen, Eleni Kosta, Igor Nai-Fovino, Simone Fischer-Hübner
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 371 p. 54 illus.)
Disciplina 005.8
Collana IFIP AICT Tutorials
Soggetto topico Computer security
Data protection
Computers and civilization
User interfaces (Computer systems)
Artificial intelligence
Computer organization
Systems and Data Security
Security
Computers and Society
User Interfaces and Human Computer Interaction
Artificial Intelligence
Computer Systems Organization and Communication Networks
ISBN 3-319-92925-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Smart World -- Towards Organizing the Growing Knowledge on Privacy Engineering -- Data Protection by Design: Promises and Perils in Crossing the Rubicon Between Law and Engineering -- Anonymity Online: Current Solutions and Challenges -- Is It Harmful? Re-examining Privacy Concerns -- Forget About Privacy ... or Not? -- From Privacy to Algorithms' Fairness -- The Consent Paradox: Accounting for the Prominent Role of Consent in Data Protection -- Life-Long Privacy in the IoT? Measuring Privacy Attitudes Throughout the Life-Cycle of IoT Devices -- Secure and Privacy-Friendly Storage and Data Processing in the Cloud -- On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments -- Towards a Broadening of Privacy Decision-Making Models: the Use of Cognitive Architectures -- Data Protection Impact Assessment: A Hands-On Tour of the GDPR's Most Practical Tool -- Designing a GDPR-compliant and Usable Privacy Dashboard -- Blockchain-Based Identity Management and Data Usage Control -- Identification Services for Online Social Networks (OSNs) -- Cyber Security & Privacy Experiments: A Design and Reporting Toolkit -- Privacy and Socially Assistive Robots - A Meta Study -- From the Glass House to the Hive: The Private Sphere in the Era of Intelligent Home Assistant Robots : A Comparative Study of Android and iOS Mobile Applications' Data -- Handling Practices versus Compliance to Privacy -- Privacy Concerns and Behavior of Pokémon Go Players in Germany -- mHealth Applications for Goal Management Training – Privacy Engineering in Neuropsychological Studies -- NFC Payments: Gaps Between User Perception and Reality -- Real-world Identification for an Extensible and Privacy-Preserving Mobile eID.
Record Nr. UNINA-9910299282603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / / edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers / / edited by David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles Raab
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 recurso en línea (XII, 359 p. 78 ilus.)
Collana FIP Advances in Information and Communication Technology
IFIP AICT Tutorials
Soggetto topico Computer security
Management information systems
Computer science
Computers and civilization
Seguridad informática
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
ISBN 3-319-41763-0
9783319417622
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Modelling the Relationship between Privacy and Security Perceptions and the Acceptance of Surveillance Practices -- The US Privacy Strategy -- Smart Society: Collaboration between Humans and Machines, Promises and Perils -- An Experience with a De-identifying Task to Inform about Privacy Issues -- A4CloudWorkshop: Accountability in the Cloud -- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements -- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies -- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World -- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO/IEC 29100 into the Software Development Process -- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments -- Accountability in the EU Data Protection Reform - Moving from Theory to Practice -- Towards Authenticity and Privacy Preserving Accountable Workflows -- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains -- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems -- Enhanced Assurance about Cloud Service Provision Promises -- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance -- Identity Theft through e-Government Services: Government to Pay the Bill? -- "All Your Data Are Belong to Us ". European Perspectives on Privacy Issues in Free Online Machine Translation Services -- Identification of Online Gamblers in the EU: A Two-Edged Sword -- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom -- Automated Log Audits for Privacy Compliance Validation: A Literature Survey -- Privacy-Preserving Access Control in Publicly Readable Storage Systems -- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
Record Nr. UNINA-9910254991203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Privacy Enhancing Technologies [[electronic resource] ] : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / / edited by Simone Fischer-Hübner, Matthew Wright
Privacy Enhancing Technologies [[electronic resource] ] : 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012, Proceedings / / edited by Simone Fischer-Hübner, Matthew Wright
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 319 p. 89 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Management information systems
Computer science
Computers and civilization
Algorithms
Cryptology
Computer Communication Networks
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
ISBN 3-642-31680-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465394503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Privacy Enhancing Technologies [[electronic resource] ] : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings / / edited by Simone Fischer-Hübner, Nicholas Hopper
Privacy Enhancing Technologies [[electronic resource] ] : 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011, Proceedings / / edited by Simone Fischer-Hübner, Nicholas Hopper
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (X, 285 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Management information systems
Computer science
Computers and civilization
Algorithms
Cryptology
Computer Communication Networks
Systems and Data Security
Management of Computing and Information Systems
Computers and Society
Algorithm Analysis and Problem Complexity
ISBN 3-642-22263-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465770003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner
Secure IT Systems [[electronic resource] ] : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 296 p. 81 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Biometrics (Biology)
Systems and Data Security
Cryptology
Biometrics
ISBN 3-319-11599-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π–Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798–2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
Record Nr. UNISA-996213651103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure IT Systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner
Secure IT Systems : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / / edited by Karin Bernsmed, Simone Fischer-Hübner
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XII, 296 p. 81 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Biometrics (Biology)
Systems and Data Security
Cryptology
Biometrics
ISBN 3-319-11599-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients’ Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π–Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798–2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
Record Nr. UNINA-9910483195603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui