Computer Security -- ESORICS 2012 [[electronic resource] ] : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings / / edited by Sara Foresti, Moti Yung, Fabio Martinelli
| Computer Security -- ESORICS 2012 [[electronic resource] ] : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings / / edited by Sara Foresti, Moti Yung, Fabio Martinelli |
| Edizione | [1st ed. 2012.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
| Descrizione fisica | 1 online resource (XVII, 896 p. 210 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Electronic commerce Electronic data processing—Management Software engineering Application software Data and Information Security Cryptology e-Commerce and e-Business IT Operations Software Engineering Computer and Information Systems Applications |
| ISBN | 3-642-33167-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Particle Swarm Embedding Algorithm for Nonlinear Dimensionality -- ABC-Miner: An Ant-Based Bayesian Classification Algorithm -- Analysing Robot Swarm Decision-Making with Bio-PEPA -- Automatic Generation of Multi-objective ACO Algorithms for the Bi-objective Knapsack -- Bare Bones Particle Swarms with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt-MinerPB Classification Algorithm -- Introducing Novelty Search in Evolutionary Swarm Robotics -- Measuring Diversity in the Cooperative Particle Swarm Optimizer -- Multi-armed Bandit Formulation of the Task Partitioning Problem in Swarm Robotics -- Scalability Study of Particle Swarm Optimizers in Dynamic Environments -- Self-reconfigurable Modular e-pucks -- Task Partitioning via Ant Colony Optimization for Distributed Assembly -- The Self-adaptive Comprehensive Learning Particle Swarm Optimizer -- Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions -- A Hybrid Particle Swarm Optimization Algorithm for the Open Vehicle Routing Problem -- A Self-adaptive Heterogeneous PSO Inspired by Ants -- A“Thermodynamic”Approach to Multi-robot Cooperative Localization with Noisy Sensors -- AcoSeeD: An Ant Colony Optimization for Finding Optimal Spaced Seeds in Biological Sequence Search -- Analysis of Ant-Based Routing with Wireless Medium Access Control -- Ant-Based Approaches for Solving Autocorrelation Problems -- Collision-Induced “Priority Rule” Governs Efficiency of Pheromone-Communicating Swarm Robots -- Dynamic Load Balancing Inspired by Cemetery Formation in Ant Colonies -- Feasibility of an Ant Colony Optimization Algorithm for Multi-leaf Collimator (MLC) Aperture Definition and Beam Weighting in Volumetric Modulated Arc Therapy (VMAT) Radiotherapy Treatment Planning -- Ant Swarm Foraging from Physical to Virtual and Back Again -- Improving Peer Review with ACORN: ACO Algorithm for Reviewer’s Network -- Learning Finite-State Machines with Ant Colony Optimization -- Mobbing Behavior and Deceit and Its Role in Bio-inspired Autonomous Robotic Agents -- Performance of Bacterial Foraging Optimization in Dynamic Environments -- Piecewise Linear Approximation of n-Dimensional Parametric Curves Using Particle Swarms -- Probabilistic Stochastic Diffusion Search -- Self-organized Clustering of Square Objects by Multiple Robots -- Self-reproduction versus Transition Rules in Ant Colonies for Medical Volume Segmentation -- Swarm Interpolation Using an Approximate Chebyshev Distribution -- Using MOPSO to Solve Multiobjective Bilevel Linear Problems -- Clustering Moodle Data via Ant Colony Optimization -- Continuous Trait-Based Particle Swarm Optimisation (CTB-PSO) -- Exploring Different Functions for Heuristics, Discretization, and Rule Quality Evaluation in Ant-Miner -- Fuzzy-Based Aggregation with a Mobile Robot Swarm -- Maturity of the Particle Swarm as a Metric for Measuring the Particle Swarm Intelligence -- Multi-objective Firefly Algorithm for Energy Optimization in Grid Environments -- Particle Swarm Optimization with Random Sampling in Variable Neighbourhoods for Solving Global Minimization Problems. |
| Record Nr. | UNISA-996465284603316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cryptology and Network Security [[electronic resource] ] : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
| Cryptology and Network Security [[electronic resource] ] : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XVI, 762 p. 116 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Coding theory Information theory Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems |
| ISBN | 3-319-48965-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465596903316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
| Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XVI, 762 p. 116 illus.) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data encryption (Computer science)
Computer security Computer networks Coding theory Information theory Management information systems Computer science Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory Management of Computing and Information Systems |
| ISBN | 3-319-48965-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910484253503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data and Applications Security and Privacy XXIV [[electronic resource] ] : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
| Data and Applications Security and Privacy XXIV [[electronic resource] ] : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XIII, 376 p. 80 illus.) |
| Disciplina | 005.8 |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer communication systems
Data encryption (Computer science) Management information systems Computer science Application software Algorithms Information storage and retrieval Computer Communication Networks Cryptology Management of Computing and Information Systems Information Systems Applications (incl. Internet) Algorithm Analysis and Problem Complexity Information Storage and Retrieval |
| ISBN |
1-280-38729-7
9786613565211 3-642-13739-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification. |
| Record Nr. | UNISA-996466433303316 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Data and Applications Security and Privacy XXIV : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
| Data and Applications Security and Privacy XXIV : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
| Descrizione fisica | 1 online resource (XIII, 376 p. 80 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ForestiSara
JajodiaSushil |
| Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
| Soggetto topico |
Computer networks
Cryptography Data encryption (Computer science) Electronic data processing - Management Application software Algorithms Information storage and retrieval systems Computer Communication Networks Cryptology IT Operations Computer and Information Systems Applications Information Storage and Retrieval |
| ISBN |
1-280-38729-7
9786613565211 3-642-13739-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity TokenDeployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification. |
| Record Nr. | UNINA-9910483603803321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Security Theory and Practice [[electronic resource] ] : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
| Information Security Theory and Practice [[electronic resource] ] : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (X, 271 p. 59 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Seguridad informática
Data encryption (Computer science) Computer organization Application software Management information systems Computer science Systems and Data Security Cryptology Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems |
| ISBN | 3-319-45931-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Authentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection. |
| Record Nr. | UNISA-996465991303316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
| Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (X, 271 p. 59 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Seguridad informática
Data encryption (Computer science) Computer organization Application software Management information systems Computer science Systems and Data Security Cryptology Computer Systems Organization and Communication Networks Information Systems Applications (incl. Internet) Management of Computing and Information Systems |
| ISBN | 3-319-45931-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Authentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection. |
| Record Nr. | UNINA-9910483416903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Trust Management [[electronic resource] ] : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
| Security and Trust Management [[electronic resource] ] : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (X, 293 p. 68 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Algorithms Computers and civilization Systems and Data Security Management of Computing and Information Systems Cryptology Algorithm Analysis and Problem Complexity Computers and Society |
| ISBN | 3-319-24858-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Security Metrics and Classification -- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns -- 1 Introduction -- 2 Related Work -- 3 Digital Waste Sorting -- 3.1 Definition of Classes -- 3.2 Feature Extraction -- 3.3 DWS Classification Workflow -- 4 Results -- 4.1 Classifier Selection -- 4.2 DWS Application -- 5 Conclusion and Future Directions -- References -- Integrating Privacy and Safety Criteria into Planning Tasks -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 The Analytic Hierarchy Process -- 4.1 AHP Hierarchy -- 4.2 Relative Importance of Criteria -- 4.3 Ranking of Alternative Plans -- 5 Criteria -- 5.1 Utility -- 5.2 Unsatisfied Safety Preferences (USP) -- 5.3 Willingness-to-Share-Data (WSD) -- 6 The Influence of Criteria Importance Ratios -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments -- 1 Introduction -- 2 Background and Related Work -- 2.1 Terminology -- 2.2 Related Work -- 3 Threat Model -- 4 Operational Measurement Trust -- 4.1 Trusted Monitoring Base -- 4.2 Secure Elements and Measurement Data -- 5 Levels of Operational Trust -- 5.1 Trusted Monitoring Base -- 5.2 Probes -- 5.3 Quantifying Overall Confidence -- 6 Operational Measurement Trust and Security Metrics -- 7 Discussion -- 8 Conclusion -- References -- Data Protection -- A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies -- 1 Introduction -- 2 Running Example -- 3 A Declarative Framework for Purpose-Aware Policies -- 3.1 Semantics of Purpose-Aware Policies -- 4 Policies Verification -- 4.1 Purpose Achievement Problem -- 4.2 Runtime Policies Verification -- 5 Discussion and Related Work -- References -- How to Trust the Re-use of Data -- 1 Introduction.
2 Klaim with Goals -- 2.1 Syntax -- 2.2 Semantics -- 3 Analysis -- 3.1 Over Approximation -- 3.2 Well-Behaved Processes -- 4 Conclusion -- A Appendix: Proofs -- References -- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business -- 1 Personal Data Markets and Privacy -- 2 Related Work -- 3 Principal-Agent Model of the Privacy Problems in Data-Centric Business -- 3.1 Assumptions and Background -- 3.2 Principal-Agent Model -- 4 Towards Balancing Privacy and Efficiency -- 4.1 S1: Privacy is Not Considered a Competitive Factor by Users -- 4.2 S3: Markets for Data-Centric Services Are Currently Monopolistic -- 4.3 S2: Privacy is Perceived as a Competitive Factor by Users But They are Unable to Determine Providers' Level of ``Privacy-Friendliness'' -- 5 Conclusion -- References -- Intrusion Detection and Software Vulnerabilities -- The AC-Index: Fast Online Detection of Correlated Alerts -- 1 Introduction -- 2 Preliminaries and Problem Formalization -- 3 The AC-Index -- 4 Experimental Results -- 5 Related Work -- 6 Conclusions -- References -- Intrusion Detection System for Applications Using Linux Containers -- 1 Introduction -- 2 Related Work -- 3 Real-Time Intrusion Detection -- 4 System Evaluation -- 4.1 Environment Setup -- 4.2 Generating Normal Workload -- 4.3 Simulating Malicious Behavior -- 4.4 Collecting Container-Behavior Data -- 4.5 Training Classifier -- 4.6 Classifier Evaluation -- 4.7 Evaluation Results -- 4.8 Complexity Analysis -- 5 Conclusion and Future Work -- References -- SUDUTA: Script UAF Detection Using Taint Analysis -- 1 Introduction -- 2 Background -- 2.1 UAF Vulnerabilities -- 2.2 Undangle -- 2.3 Formalizing Taint Policy Rules -- 3 SUDUTA -- 3.1 Taint Policy -- 3.2 On-line Dynamic Taint Analysis -- 3.3 Custom Memory Allocator Monitoring -- 4 Evaluation -- 5 Related Work -- 6 Conclusion. References -- Cryptographic Protocols -- Two-Factor Authentication for the Bitcoin Protocol -- 1 Introduction -- 2 Bitcoin Protocol -- 3 Threshold Signatures -- 3.1 Two-Party ECDSA -- 3.2 Threshold Signature Support in Bitcoin -- 4 Two-Factor Bitcoin Wallets -- 4.1 Description of the Prototype -- 5 Implementation Aspects -- 5.1 Runtime Analysis -- 6 Future Work -- 7 Conclusion -- References -- Private Proximity Testing on Steroids: An NTRU-based Protocol -- 1 Introduction -- 2 Related Work -- 2.1 NTRU -- 2.2 Private Proximity Testing -- 2.3 The Protocol of Narayanan et al. -- 3 The Proposed Protocol -- 3.1 Threat Model -- 3.2 Main Actors and Desiderata -- 3.3 The Protocol -- 3.4 Protocol Correctness -- 3.5 Security Analysis -- 4 Comparison/Experimental Results -- 5 Conclusions -- References -- Selecting a New Key Derivation Function for Disk Encryption -- 1 Introduction -- 2 Requirements for a Key Derivation Function -- 2.1 Environment for Disk Encryption -- 2.2 Requirements for a Disk Encryption Application -- 3 KDF Building Blocks -- 3.1 Cryptographic Primitives -- 3.2 Concepts to Utilize Resources During Computation -- 3.3 Ingredients -- 3.4 Processing Unlimited Input and Output -- 4 PHC Candidates as KDF Algorithms -- 4.1 Argon -- 4.2 Battcrypt -- 4.3 Catena -- 4.4 Lyra2 -- 4.5 Yescrypt -- 4.6 Algorithms Not Selected for Further Testing -- 4.7 Overview -- 5 Run-Time Test -- 5.1 Specific Use Case Measurement -- 5.2 Fixed Implementation Issues -- 6 Conclusions and Open Issues -- A Appendix -- A.1 PHC Candidate Implementation and Benchmarking Tests -- A.2 PHC Test Report -- References -- Controlling Data Release -- It's My Privilege: Controlling Downgrading in DC-Labels -- 1 Introduction -- 2 Background -- 3 Security Definitions -- 4 Enforcement for Robust Privileges -- 5 Interaction Among Restricted Privileges -- 6 Case Studies. 6.1 Calendar Case Study -- 6.2 Restricted Privileges in Existing Applications -- 7 Related Work -- 8 Conclusion -- References -- Obligations in PTaCL -- 1 Introduction -- 2 PTaCL -- 2.1 Syntax and Semantics -- 2.2 Additional Operators -- 3 Obligations in PTaCL -- 3.1 Defining Obligations in PTaCL -- 3.2 Computing Obligations in PTaCL -- 3.3 Computing Obligations for Derived Policy Operators -- 4 Indeterminacy in PTaCL -- 4.1 Failure of Target Evaluation -- 4.2 Failure of Policy Retrieval -- 5 XACML and Other Related Work -- 6 Conclusion -- References -- Content and Key Management to Trace Traitors in Broadcasting Services -- 1 Introduction -- 1.1 Background -- 1.2 Related Works -- 1.3 Our Contributions -- 2 Preparation: Traitor Tracing Mechanism in [1] -- 3 Proposal: Content and Key Management (CKM) -- 3.1 Content Comparison Attack -- 3.2 Content Management: Slight Modification of Coded Content -- 3.3 Content and Key Management Method -- 3.4 Actual Content and Key Management System -- 3.5 Content and Key Management Method for TTE -- 4 Discussion and Security Analysis -- 4.1 Simplicity of CKM -- 4.2 Security -- 4.3 Transmission Bit Rate -- 5 Conclusion -- References -- Security Analysis, Risk Management, and Usability -- In Cyber-Space No One Can Hear You SCREAM -- 1 Introduction -- 2 Methods -- 3 SCREAM: An RCA for Computer Security -- 3.1 Adapting CREAM as an RCA Technique for Security -- 3.2 Using SCREAM -- 4 Building the Catalog of Attack Modes -- 5 Discussion -- 6 Conclusion -- References -- A Socio-Technical Investigation into Smartphone Security -- 1 Introduction -- 2 Methodology -- 2.1 Interview Protocol -- 2.2 Participants -- 2.3 Analysis -- 3 Results -- 3.1 Lack of Awareness -- 3.2 Lack of Concern -- 3.3 Lack of Self-Efficacy -- 3.4 Lack of Compulsion -- 3.5 Lack of Perseverance -- 4 Model of Precaution Adoption -- 5 Related Work. 6 Conclusions and Future Work -- References -- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users -- Abstract -- 1 Introduction -- 2 Cyber Security Game -- 2.1 Player Objectives -- 2.2 User -- Defender Game -- 2.3 User-Attacker Game -- 2.4 Attacker-Defender Game -- 3 Related Work -- 4 Conclusions -- Acknowledgments -- References -- Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks -- 1 Introduction -- 2 Related Work -- 3 Requirements for ISC and TM -- 4 Design and Development of ISC and TM -- 4.1 Information Security Contract -- 4.2 Trading Mechanism -- 5 Demonastration: ISC to Hedge Underlying Risk -- 6 Evaluation -- 7 Conclusion -- References -- Author Index. |
| Record Nr. | UNISA-996466302003316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security and Trust Management : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
| Security and Trust Management : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (X, 293 p. 68 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Algorithms Computers and civilization Systems and Data Security Management of Computing and Information Systems Cryptology Algorithm Analysis and Problem Complexity Computers and Society |
| ISBN | 3-319-24858-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Security Metrics and Classification -- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns -- 1 Introduction -- 2 Related Work -- 3 Digital Waste Sorting -- 3.1 Definition of Classes -- 3.2 Feature Extraction -- 3.3 DWS Classification Workflow -- 4 Results -- 4.1 Classifier Selection -- 4.2 DWS Application -- 5 Conclusion and Future Directions -- References -- Integrating Privacy and Safety Criteria into Planning Tasks -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 The Analytic Hierarchy Process -- 4.1 AHP Hierarchy -- 4.2 Relative Importance of Criteria -- 4.3 Ranking of Alternative Plans -- 5 Criteria -- 5.1 Utility -- 5.2 Unsatisfied Safety Preferences (USP) -- 5.3 Willingness-to-Share-Data (WSD) -- 6 The Influence of Criteria Importance Ratios -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments -- 1 Introduction -- 2 Background and Related Work -- 2.1 Terminology -- 2.2 Related Work -- 3 Threat Model -- 4 Operational Measurement Trust -- 4.1 Trusted Monitoring Base -- 4.2 Secure Elements and Measurement Data -- 5 Levels of Operational Trust -- 5.1 Trusted Monitoring Base -- 5.2 Probes -- 5.3 Quantifying Overall Confidence -- 6 Operational Measurement Trust and Security Metrics -- 7 Discussion -- 8 Conclusion -- References -- Data Protection -- A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies -- 1 Introduction -- 2 Running Example -- 3 A Declarative Framework for Purpose-Aware Policies -- 3.1 Semantics of Purpose-Aware Policies -- 4 Policies Verification -- 4.1 Purpose Achievement Problem -- 4.2 Runtime Policies Verification -- 5 Discussion and Related Work -- References -- How to Trust the Re-use of Data -- 1 Introduction.
2 Klaim with Goals -- 2.1 Syntax -- 2.2 Semantics -- 3 Analysis -- 3.1 Over Approximation -- 3.2 Well-Behaved Processes -- 4 Conclusion -- A Appendix: Proofs -- References -- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business -- 1 Personal Data Markets and Privacy -- 2 Related Work -- 3 Principal-Agent Model of the Privacy Problems in Data-Centric Business -- 3.1 Assumptions and Background -- 3.2 Principal-Agent Model -- 4 Towards Balancing Privacy and Efficiency -- 4.1 S1: Privacy is Not Considered a Competitive Factor by Users -- 4.2 S3: Markets for Data-Centric Services Are Currently Monopolistic -- 4.3 S2: Privacy is Perceived as a Competitive Factor by Users But They are Unable to Determine Providers' Level of ``Privacy-Friendliness'' -- 5 Conclusion -- References -- Intrusion Detection and Software Vulnerabilities -- The AC-Index: Fast Online Detection of Correlated Alerts -- 1 Introduction -- 2 Preliminaries and Problem Formalization -- 3 The AC-Index -- 4 Experimental Results -- 5 Related Work -- 6 Conclusions -- References -- Intrusion Detection System for Applications Using Linux Containers -- 1 Introduction -- 2 Related Work -- 3 Real-Time Intrusion Detection -- 4 System Evaluation -- 4.1 Environment Setup -- 4.2 Generating Normal Workload -- 4.3 Simulating Malicious Behavior -- 4.4 Collecting Container-Behavior Data -- 4.5 Training Classifier -- 4.6 Classifier Evaluation -- 4.7 Evaluation Results -- 4.8 Complexity Analysis -- 5 Conclusion and Future Work -- References -- SUDUTA: Script UAF Detection Using Taint Analysis -- 1 Introduction -- 2 Background -- 2.1 UAF Vulnerabilities -- 2.2 Undangle -- 2.3 Formalizing Taint Policy Rules -- 3 SUDUTA -- 3.1 Taint Policy -- 3.2 On-line Dynamic Taint Analysis -- 3.3 Custom Memory Allocator Monitoring -- 4 Evaluation -- 5 Related Work -- 6 Conclusion. References -- Cryptographic Protocols -- Two-Factor Authentication for the Bitcoin Protocol -- 1 Introduction -- 2 Bitcoin Protocol -- 3 Threshold Signatures -- 3.1 Two-Party ECDSA -- 3.2 Threshold Signature Support in Bitcoin -- 4 Two-Factor Bitcoin Wallets -- 4.1 Description of the Prototype -- 5 Implementation Aspects -- 5.1 Runtime Analysis -- 6 Future Work -- 7 Conclusion -- References -- Private Proximity Testing on Steroids: An NTRU-based Protocol -- 1 Introduction -- 2 Related Work -- 2.1 NTRU -- 2.2 Private Proximity Testing -- 2.3 The Protocol of Narayanan et al. -- 3 The Proposed Protocol -- 3.1 Threat Model -- 3.2 Main Actors and Desiderata -- 3.3 The Protocol -- 3.4 Protocol Correctness -- 3.5 Security Analysis -- 4 Comparison/Experimental Results -- 5 Conclusions -- References -- Selecting a New Key Derivation Function for Disk Encryption -- 1 Introduction -- 2 Requirements for a Key Derivation Function -- 2.1 Environment for Disk Encryption -- 2.2 Requirements for a Disk Encryption Application -- 3 KDF Building Blocks -- 3.1 Cryptographic Primitives -- 3.2 Concepts to Utilize Resources During Computation -- 3.3 Ingredients -- 3.4 Processing Unlimited Input and Output -- 4 PHC Candidates as KDF Algorithms -- 4.1 Argon -- 4.2 Battcrypt -- 4.3 Catena -- 4.4 Lyra2 -- 4.5 Yescrypt -- 4.6 Algorithms Not Selected for Further Testing -- 4.7 Overview -- 5 Run-Time Test -- 5.1 Specific Use Case Measurement -- 5.2 Fixed Implementation Issues -- 6 Conclusions and Open Issues -- A Appendix -- A.1 PHC Candidate Implementation and Benchmarking Tests -- A.2 PHC Test Report -- References -- Controlling Data Release -- It's My Privilege: Controlling Downgrading in DC-Labels -- 1 Introduction -- 2 Background -- 3 Security Definitions -- 4 Enforcement for Robust Privileges -- 5 Interaction Among Restricted Privileges -- 6 Case Studies. 6.1 Calendar Case Study -- 6.2 Restricted Privileges in Existing Applications -- 7 Related Work -- 8 Conclusion -- References -- Obligations in PTaCL -- 1 Introduction -- 2 PTaCL -- 2.1 Syntax and Semantics -- 2.2 Additional Operators -- 3 Obligations in PTaCL -- 3.1 Defining Obligations in PTaCL -- 3.2 Computing Obligations in PTaCL -- 3.3 Computing Obligations for Derived Policy Operators -- 4 Indeterminacy in PTaCL -- 4.1 Failure of Target Evaluation -- 4.2 Failure of Policy Retrieval -- 5 XACML and Other Related Work -- 6 Conclusion -- References -- Content and Key Management to Trace Traitors in Broadcasting Services -- 1 Introduction -- 1.1 Background -- 1.2 Related Works -- 1.3 Our Contributions -- 2 Preparation: Traitor Tracing Mechanism in [1] -- 3 Proposal: Content and Key Management (CKM) -- 3.1 Content Comparison Attack -- 3.2 Content Management: Slight Modification of Coded Content -- 3.3 Content and Key Management Method -- 3.4 Actual Content and Key Management System -- 3.5 Content and Key Management Method for TTE -- 4 Discussion and Security Analysis -- 4.1 Simplicity of CKM -- 4.2 Security -- 4.3 Transmission Bit Rate -- 5 Conclusion -- References -- Security Analysis, Risk Management, and Usability -- In Cyber-Space No One Can Hear You SCREAM -- 1 Introduction -- 2 Methods -- 3 SCREAM: An RCA for Computer Security -- 3.1 Adapting CREAM as an RCA Technique for Security -- 3.2 Using SCREAM -- 4 Building the Catalog of Attack Modes -- 5 Discussion -- 6 Conclusion -- References -- A Socio-Technical Investigation into Smartphone Security -- 1 Introduction -- 2 Methodology -- 2.1 Interview Protocol -- 2.2 Participants -- 2.3 Analysis -- 3 Results -- 3.1 Lack of Awareness -- 3.2 Lack of Concern -- 3.3 Lack of Self-Efficacy -- 3.4 Lack of Compulsion -- 3.5 Lack of Perseverance -- 4 Model of Precaution Adoption -- 5 Related Work. 6 Conclusions and Future Work -- References -- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users -- Abstract -- 1 Introduction -- 2 Cyber Security Game -- 2.1 Player Objectives -- 2.2 User -- Defender Game -- 2.3 User-Attacker Game -- 2.4 Attacker-Defender Game -- 3 Related Work -- 4 Conclusions -- Acknowledgments -- References -- Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks -- 1 Introduction -- 2 Related Work -- 3 Requirements for ISC and TM -- 4 Design and Development of ISC and TM -- 4.1 Information Security Contract -- 4.2 Trading Mechanism -- 5 Demonastration: ISC to Hedge Underlying Risk -- 6 Evaluation -- 7 Conclusion -- References -- Author Index. |
| Record Nr. | UNINA-9910483855203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||