top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security -- ESORICS 2012 [[electronic resource] ] : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings / / edited by Sara Foresti, Moti Yung, Fabio Martinelli
Computer Security -- ESORICS 2012 [[electronic resource] ] : 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings / / edited by Sara Foresti, Moti Yung, Fabio Martinelli
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XVII, 896 p. 210 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic commerce
Electronic data processing—Management
Software engineering
Application software
Data and Information Security
Cryptology
e-Commerce and e-Business
IT Operations
Software Engineering
Computer and Information Systems Applications
ISBN 3-642-33167-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Particle Swarm Embedding Algorithm for Nonlinear Dimensionality -- ABC-Miner: An Ant-Based Bayesian Classification Algorithm -- Analysing Robot Swarm Decision-Making with Bio-PEPA -- Automatic Generation of Multi-objective ACO Algorithms for the Bi-objective Knapsack -- Bare Bones Particle Swarms with Jumps -- Hybrid Algorithms for the Minimum-Weight Rooted Arborescence Problem -- Improving the cAnt-MinerPB Classification Algorithm -- Introducing Novelty Search in Evolutionary Swarm Robotics -- Measuring Diversity in the Cooperative Particle Swarm Optimizer -- Multi-armed Bandit Formulation of the Task Partitioning Problem in Swarm Robotics -- Scalability Study of Particle Swarm Optimizers in Dynamic Environments -- Self-reconfigurable Modular e-pucks -- Task Partitioning via Ant Colony Optimization for Distributed Assembly -- The Self-adaptive Comprehensive Learning Particle Swarm Optimizer -- Towards Swarm Calculus: Universal Properties of Swarm Performance and Collective Decisions -- A Hybrid Particle Swarm Optimization Algorithm for the Open Vehicle Routing Problem -- A Self-adaptive Heterogeneous PSO Inspired by Ants -- A“Thermodynamic”Approach to Multi-robot Cooperative Localization with Noisy Sensors -- AcoSeeD: An Ant Colony Optimization for Finding Optimal Spaced Seeds in Biological Sequence Search -- Analysis of Ant-Based Routing with Wireless Medium Access Control -- Ant-Based Approaches for Solving Autocorrelation Problems -- Collision-Induced “Priority Rule” Governs Efficiency of Pheromone-Communicating Swarm Robots -- Dynamic Load Balancing Inspired by Cemetery Formation in Ant Colonies -- Feasibility of an Ant Colony Optimization Algorithm for Multi-leaf Collimator (MLC) Aperture Definition and Beam Weighting in Volumetric Modulated Arc Therapy (VMAT) Radiotherapy Treatment Planning -- Ant Swarm Foraging from Physical to Virtual and Back Again -- Improving Peer Review with ACORN: ACO Algorithm for Reviewer’s Network -- Learning Finite-State Machines with Ant Colony Optimization -- Mobbing Behavior and Deceit and Its Role in Bio-inspired Autonomous Robotic Agents -- Performance of Bacterial Foraging Optimization in Dynamic Environments -- Piecewise Linear Approximation of n-Dimensional Parametric Curves Using Particle Swarms -- Probabilistic Stochastic Diffusion Search -- Self-organized Clustering of Square Objects by Multiple Robots -- Self-reproduction versus Transition Rules in Ant Colonies for Medical Volume Segmentation -- Swarm Interpolation Using an Approximate Chebyshev Distribution -- Using MOPSO to Solve Multiobjective Bilevel Linear Problems -- Clustering Moodle Data via Ant Colony Optimization -- Continuous Trait-Based Particle Swarm Optimisation (CTB-PSO) -- Exploring Different Functions for Heuristics, Discretization, and Rule Quality Evaluation in Ant-Miner -- Fuzzy-Based Aggregation with a Mobile Robot Swarm -- Maturity of the Particle Swarm as a Metric for Measuring the Particle Swarm Intelligence -- Multi-objective Firefly Algorithm for Energy Optimization in Grid Environments -- Particle Swarm Optimization with Random Sampling in Variable Neighbourhoods for Solving Global Minimization Problems.
Record Nr. UNISA-996465284603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security [[electronic resource] ] : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
Cryptology and Network Security [[electronic resource] ] : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 762 p. 116 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Management information systems
Computer science
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Management of Computing and Information Systems
ISBN 3-319-48965-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465596903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
Cryptology and Network Security : 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings / / edited by Sara Foresti, Giuseppe Persiano
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVI, 762 p. 116 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer networks
Coding theory
Information theory
Management information systems
Computer science
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
Management of Computing and Information Systems
ISBN 3-319-48965-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484253503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXIV [[electronic resource] ] : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
Data and Applications Security and Privacy XXIV [[electronic resource] ] : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 376 p. 80 illus.)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer communication systems
Data encryption (Computer science)
Management information systems
Computer science
Application software
Algorithms
Information storage and retrieval
Computer Communication Networks
Cryptology
Management of Computing and Information Systems
Information Systems Applications (incl. Internet)
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
ISBN 1-280-38729-7
9786613565211
3-642-13739-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification.
Record Nr. UNISA-996466433303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXIV : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
Data and Applications Security and Privacy XXIV : 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010, Proceedings / / edited by Sara Foresti, Sushil Jajodia
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 376 p. 80 illus.)
Disciplina 005.8
Altri autori (Persone) ForestiSara
JajodiaSushil
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing - Management
Application software
Algorithms
Information storage and retrieval systems
Computer Communication Networks
Cryptology
IT Operations
Computer and Information Systems Applications
Information Storage and Retrieval
ISBN 1-280-38729-7
9786613565211
3-642-13739-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Query and Data Privacy -- Generalizing PIR for Practical Private Retrieval of Public Data -- A Logic of Privacy -- Understanding Privacy Risk of Publishing Decision Trees -- Data Protection -- Secure Outsourcing of DNA Searching via Finite Automata -- A Labelling System for Derived Data Control -- On the Identification of Property Based Generalizations in Microdata Anonymization -- Access Control -- Role Mining in the Presence of Noise -- Distributed and Secure Access Control in P2P Databases -- Constructing Key Assignment Schemes from Chain Partitions -- Data Confidentiality and Query Verification -- fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality -- Efficient Inference Control for Open Relational Queries -- Query Racing: Fast Completeness Certification of Query Results -- Policy Definition and Enforcement -- Mining Likely Properties of Access Control Policies via Association Rule Mining -- Scalable and Efficient Reasoning for Enforcing Role-Based Access Control -- Enforcing Request Integrity in Web Applications -- Trust and Identity Management -- Using Trust-Based Information Aggregation for Predicting Security Level of Systems -- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms -- Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms -- Short Papers -- An Access Control Model for Web Databases -- Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems -- Evaluating the Risk of Adopting RBAC Roles -- Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance -- When ABE Meets RSS -- PriMan : A Privacy-Preserving Identity Framework -- Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach -- Authentication Assurance Level Taxonomies for Smart Identity TokenDeployments - A New Approach -- A Secure RFID Ticket System for Public Transport -- Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols -- Secure Location Verification.
Record Nr. UNINA-9910483603803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Theory and Practice [[electronic resource] ] : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
Information Security Theory and Practice [[electronic resource] ] : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 271 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Computer organization
Application software
Management information systems
Computer science
Systems and Data Security
Cryptology
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-319-45931-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection.
Record Nr. UNISA-996465991303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings / / edited by Sara Foresti, Javier Lopez
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (X, 271 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Seguridad informática
Data encryption (Computer science)
Computer organization
Application software
Management information systems
Computer science
Systems and Data Security
Cryptology
Computer Systems Organization and Communication Networks
Information Systems Applications (incl. Internet)
Management of Computing and Information Systems
ISBN 3-319-45931-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and key management -- Secure hardware systems -- Attacks to software and network systems -- Access control and data protection.
Record Nr. UNINA-9910483416903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
Security and Trust Management [[electronic resource] ] : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 293 p. 68 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Computers and civilization
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-24858-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Security Metrics and Classification -- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns -- 1 Introduction -- 2 Related Work -- 3 Digital Waste Sorting -- 3.1 Definition of Classes -- 3.2 Feature Extraction -- 3.3 DWS Classification Workflow -- 4 Results -- 4.1 Classifier Selection -- 4.2 DWS Application -- 5 Conclusion and Future Directions -- References -- Integrating Privacy and Safety Criteria into Planning Tasks -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 The Analytic Hierarchy Process -- 4.1 AHP Hierarchy -- 4.2 Relative Importance of Criteria -- 4.3 Ranking of Alternative Plans -- 5 Criteria -- 5.1 Utility -- 5.2 Unsatisfied Safety Preferences (USP) -- 5.3 Willingness-to-Share-Data (WSD) -- 6 The Influence of Criteria Importance Ratios -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments -- 1 Introduction -- 2 Background and Related Work -- 2.1 Terminology -- 2.2 Related Work -- 3 Threat Model -- 4 Operational Measurement Trust -- 4.1 Trusted Monitoring Base -- 4.2 Secure Elements and Measurement Data -- 5 Levels of Operational Trust -- 5.1 Trusted Monitoring Base -- 5.2 Probes -- 5.3 Quantifying Overall Confidence -- 6 Operational Measurement Trust and Security Metrics -- 7 Discussion -- 8 Conclusion -- References -- Data Protection -- A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies -- 1 Introduction -- 2 Running Example -- 3 A Declarative Framework for Purpose-Aware Policies -- 3.1 Semantics of Purpose-Aware Policies -- 4 Policies Verification -- 4.1 Purpose Achievement Problem -- 4.2 Runtime Policies Verification -- 5 Discussion and Related Work -- References -- How to Trust the Re-use of Data -- 1 Introduction.
2 Klaim with Goals -- 2.1 Syntax -- 2.2 Semantics -- 3 Analysis -- 3.1 Over Approximation -- 3.2 Well-Behaved Processes -- 4 Conclusion -- A Appendix: Proofs -- References -- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business -- 1 Personal Data Markets and Privacy -- 2 Related Work -- 3 Principal-Agent Model of the Privacy Problems in Data-Centric Business -- 3.1 Assumptions and Background -- 3.2 Principal-Agent Model -- 4 Towards Balancing Privacy and Efficiency -- 4.1 S1: Privacy is Not Considered a Competitive Factor by Users -- 4.2 S3: Markets for Data-Centric Services Are Currently Monopolistic -- 4.3 S2: Privacy is Perceived as a Competitive Factor by Users But They are Unable to Determine Providers' Level of ``Privacy-Friendliness'' -- 5 Conclusion -- References -- Intrusion Detection and Software Vulnerabilities -- The AC-Index: Fast Online Detection of Correlated Alerts -- 1 Introduction -- 2 Preliminaries and Problem Formalization -- 3 The AC-Index -- 4 Experimental Results -- 5 Related Work -- 6 Conclusions -- References -- Intrusion Detection System for Applications Using Linux Containers -- 1 Introduction -- 2 Related Work -- 3 Real-Time Intrusion Detection -- 4 System Evaluation -- 4.1 Environment Setup -- 4.2 Generating Normal Workload -- 4.3 Simulating Malicious Behavior -- 4.4 Collecting Container-Behavior Data -- 4.5 Training Classifier -- 4.6 Classifier Evaluation -- 4.7 Evaluation Results -- 4.8 Complexity Analysis -- 5 Conclusion and Future Work -- References -- SUDUTA: Script UAF Detection Using Taint Analysis -- 1 Introduction -- 2 Background -- 2.1 UAF Vulnerabilities -- 2.2 Undangle -- 2.3 Formalizing Taint Policy Rules -- 3 SUDUTA -- 3.1 Taint Policy -- 3.2 On-line Dynamic Taint Analysis -- 3.3 Custom Memory Allocator Monitoring -- 4 Evaluation -- 5 Related Work -- 6 Conclusion.
References -- Cryptographic Protocols -- Two-Factor Authentication for the Bitcoin Protocol -- 1 Introduction -- 2 Bitcoin Protocol -- 3 Threshold Signatures -- 3.1 Two-Party ECDSA -- 3.2 Threshold Signature Support in Bitcoin -- 4 Two-Factor Bitcoin Wallets -- 4.1 Description of the Prototype -- 5 Implementation Aspects -- 5.1 Runtime Analysis -- 6 Future Work -- 7 Conclusion -- References -- Private Proximity Testing on Steroids: An NTRU-based Protocol -- 1 Introduction -- 2 Related Work -- 2.1 NTRU -- 2.2 Private Proximity Testing -- 2.3 The Protocol of Narayanan et al. -- 3 The Proposed Protocol -- 3.1 Threat Model -- 3.2 Main Actors and Desiderata -- 3.3 The Protocol -- 3.4 Protocol Correctness -- 3.5 Security Analysis -- 4 Comparison/Experimental Results -- 5 Conclusions -- References -- Selecting a New Key Derivation Function for Disk Encryption -- 1 Introduction -- 2 Requirements for a Key Derivation Function -- 2.1 Environment for Disk Encryption -- 2.2 Requirements for a Disk Encryption Application -- 3 KDF Building Blocks -- 3.1 Cryptographic Primitives -- 3.2 Concepts to Utilize Resources During Computation -- 3.3 Ingredients -- 3.4 Processing Unlimited Input and Output -- 4 PHC Candidates as KDF Algorithms -- 4.1 Argon -- 4.2 Battcrypt -- 4.3 Catena -- 4.4 Lyra2 -- 4.5 Yescrypt -- 4.6 Algorithms Not Selected for Further Testing -- 4.7 Overview -- 5 Run-Time Test -- 5.1 Specific Use Case Measurement -- 5.2 Fixed Implementation Issues -- 6 Conclusions and Open Issues -- A Appendix -- A.1 PHC Candidate Implementation and Benchmarking Tests -- A.2 PHC Test Report -- References -- Controlling Data Release -- It's My Privilege: Controlling Downgrading in DC-Labels -- 1 Introduction -- 2 Background -- 3 Security Definitions -- 4 Enforcement for Robust Privileges -- 5 Interaction Among Restricted Privileges -- 6 Case Studies.
6.1 Calendar Case Study -- 6.2 Restricted Privileges in Existing Applications -- 7 Related Work -- 8 Conclusion -- References -- Obligations in PTaCL -- 1 Introduction -- 2 PTaCL -- 2.1 Syntax and Semantics -- 2.2 Additional Operators -- 3 Obligations in PTaCL -- 3.1 Defining Obligations in PTaCL -- 3.2 Computing Obligations in PTaCL -- 3.3 Computing Obligations for Derived Policy Operators -- 4 Indeterminacy in PTaCL -- 4.1 Failure of Target Evaluation -- 4.2 Failure of Policy Retrieval -- 5 XACML and Other Related Work -- 6 Conclusion -- References -- Content and Key Management to Trace Traitors in Broadcasting Services -- 1 Introduction -- 1.1 Background -- 1.2 Related Works -- 1.3 Our Contributions -- 2 Preparation: Traitor Tracing Mechanism in [1] -- 3 Proposal: Content and Key Management (CKM) -- 3.1 Content Comparison Attack -- 3.2 Content Management: Slight Modification of Coded Content -- 3.3 Content and Key Management Method -- 3.4 Actual Content and Key Management System -- 3.5 Content and Key Management Method for TTE -- 4 Discussion and Security Analysis -- 4.1 Simplicity of CKM -- 4.2 Security -- 4.3 Transmission Bit Rate -- 5 Conclusion -- References -- Security Analysis, Risk Management, and Usability -- In Cyber-Space No One Can Hear You SCREAM -- 1 Introduction -- 2 Methods -- 3 SCREAM: An RCA for Computer Security -- 3.1 Adapting CREAM as an RCA Technique for Security -- 3.2 Using SCREAM -- 4 Building the Catalog of Attack Modes -- 5 Discussion -- 6 Conclusion -- References -- A Socio-Technical Investigation into Smartphone Security -- 1 Introduction -- 2 Methodology -- 2.1 Interview Protocol -- 2.2 Participants -- 2.3 Analysis -- 3 Results -- 3.1 Lack of Awareness -- 3.2 Lack of Concern -- 3.3 Lack of Self-Efficacy -- 3.4 Lack of Compulsion -- 3.5 Lack of Perseverance -- 4 Model of Precaution Adoption -- 5 Related Work.
6 Conclusions and Future Work -- References -- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users -- Abstract -- 1 Introduction -- 2 Cyber Security Game -- 2.1 Player Objectives -- 2.2 User -- Defender Game -- 2.3 User-Attacker Game -- 2.4 Attacker-Defender Game -- 3 Related Work -- 4 Conclusions -- Acknowledgments -- References -- Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks -- 1 Introduction -- 2 Related Work -- 3 Requirements for ISC and TM -- 4 Design and Development of ISC and TM -- 4.1 Information Security Contract -- 4.2 Trading Mechanism -- 5 Demonastration: ISC to Hedge Underlying Risk -- 6 Evaluation -- 7 Conclusion -- References -- Author Index.
Record Nr. UNISA-996466302003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
Security and Trust Management : 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings / / edited by Sara Foresti
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (X, 293 p. 68 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Algorithms
Computers and civilization
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Algorithm Analysis and Problem Complexity
Computers and Society
ISBN 3-319-24858-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Security Metrics and Classification -- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns -- 1 Introduction -- 2 Related Work -- 3 Digital Waste Sorting -- 3.1 Definition of Classes -- 3.2 Feature Extraction -- 3.3 DWS Classification Workflow -- 4 Results -- 4.1 Classifier Selection -- 4.2 DWS Application -- 5 Conclusion and Future Directions -- References -- Integrating Privacy and Safety Criteria into Planning Tasks -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 The Analytic Hierarchy Process -- 4.1 AHP Hierarchy -- 4.2 Relative Importance of Criteria -- 4.3 Ranking of Alternative Plans -- 5 Criteria -- 5.1 Utility -- 5.2 Unsatisfied Safety Preferences (USP) -- 5.3 Willingness-to-Share-Data (WSD) -- 6 The Influence of Criteria Importance Ratios -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments -- 1 Introduction -- 2 Background and Related Work -- 2.1 Terminology -- 2.2 Related Work -- 3 Threat Model -- 4 Operational Measurement Trust -- 4.1 Trusted Monitoring Base -- 4.2 Secure Elements and Measurement Data -- 5 Levels of Operational Trust -- 5.1 Trusted Monitoring Base -- 5.2 Probes -- 5.3 Quantifying Overall Confidence -- 6 Operational Measurement Trust and Security Metrics -- 7 Discussion -- 8 Conclusion -- References -- Data Protection -- A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies -- 1 Introduction -- 2 Running Example -- 3 A Declarative Framework for Purpose-Aware Policies -- 3.1 Semantics of Purpose-Aware Policies -- 4 Policies Verification -- 4.1 Purpose Achievement Problem -- 4.2 Runtime Policies Verification -- 5 Discussion and Related Work -- References -- How to Trust the Re-use of Data -- 1 Introduction.
2 Klaim with Goals -- 2.1 Syntax -- 2.2 Semantics -- 3 Analysis -- 3.1 Over Approximation -- 3.2 Well-Behaved Processes -- 4 Conclusion -- A Appendix: Proofs -- References -- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business -- 1 Personal Data Markets and Privacy -- 2 Related Work -- 3 Principal-Agent Model of the Privacy Problems in Data-Centric Business -- 3.1 Assumptions and Background -- 3.2 Principal-Agent Model -- 4 Towards Balancing Privacy and Efficiency -- 4.1 S1: Privacy is Not Considered a Competitive Factor by Users -- 4.2 S3: Markets for Data-Centric Services Are Currently Monopolistic -- 4.3 S2: Privacy is Perceived as a Competitive Factor by Users But They are Unable to Determine Providers' Level of ``Privacy-Friendliness'' -- 5 Conclusion -- References -- Intrusion Detection and Software Vulnerabilities -- The AC-Index: Fast Online Detection of Correlated Alerts -- 1 Introduction -- 2 Preliminaries and Problem Formalization -- 3 The AC-Index -- 4 Experimental Results -- 5 Related Work -- 6 Conclusions -- References -- Intrusion Detection System for Applications Using Linux Containers -- 1 Introduction -- 2 Related Work -- 3 Real-Time Intrusion Detection -- 4 System Evaluation -- 4.1 Environment Setup -- 4.2 Generating Normal Workload -- 4.3 Simulating Malicious Behavior -- 4.4 Collecting Container-Behavior Data -- 4.5 Training Classifier -- 4.6 Classifier Evaluation -- 4.7 Evaluation Results -- 4.8 Complexity Analysis -- 5 Conclusion and Future Work -- References -- SUDUTA: Script UAF Detection Using Taint Analysis -- 1 Introduction -- 2 Background -- 2.1 UAF Vulnerabilities -- 2.2 Undangle -- 2.3 Formalizing Taint Policy Rules -- 3 SUDUTA -- 3.1 Taint Policy -- 3.2 On-line Dynamic Taint Analysis -- 3.3 Custom Memory Allocator Monitoring -- 4 Evaluation -- 5 Related Work -- 6 Conclusion.
References -- Cryptographic Protocols -- Two-Factor Authentication for the Bitcoin Protocol -- 1 Introduction -- 2 Bitcoin Protocol -- 3 Threshold Signatures -- 3.1 Two-Party ECDSA -- 3.2 Threshold Signature Support in Bitcoin -- 4 Two-Factor Bitcoin Wallets -- 4.1 Description of the Prototype -- 5 Implementation Aspects -- 5.1 Runtime Analysis -- 6 Future Work -- 7 Conclusion -- References -- Private Proximity Testing on Steroids: An NTRU-based Protocol -- 1 Introduction -- 2 Related Work -- 2.1 NTRU -- 2.2 Private Proximity Testing -- 2.3 The Protocol of Narayanan et al. -- 3 The Proposed Protocol -- 3.1 Threat Model -- 3.2 Main Actors and Desiderata -- 3.3 The Protocol -- 3.4 Protocol Correctness -- 3.5 Security Analysis -- 4 Comparison/Experimental Results -- 5 Conclusions -- References -- Selecting a New Key Derivation Function for Disk Encryption -- 1 Introduction -- 2 Requirements for a Key Derivation Function -- 2.1 Environment for Disk Encryption -- 2.2 Requirements for a Disk Encryption Application -- 3 KDF Building Blocks -- 3.1 Cryptographic Primitives -- 3.2 Concepts to Utilize Resources During Computation -- 3.3 Ingredients -- 3.4 Processing Unlimited Input and Output -- 4 PHC Candidates as KDF Algorithms -- 4.1 Argon -- 4.2 Battcrypt -- 4.3 Catena -- 4.4 Lyra2 -- 4.5 Yescrypt -- 4.6 Algorithms Not Selected for Further Testing -- 4.7 Overview -- 5 Run-Time Test -- 5.1 Specific Use Case Measurement -- 5.2 Fixed Implementation Issues -- 6 Conclusions and Open Issues -- A Appendix -- A.1 PHC Candidate Implementation and Benchmarking Tests -- A.2 PHC Test Report -- References -- Controlling Data Release -- It's My Privilege: Controlling Downgrading in DC-Labels -- 1 Introduction -- 2 Background -- 3 Security Definitions -- 4 Enforcement for Robust Privileges -- 5 Interaction Among Restricted Privileges -- 6 Case Studies.
6.1 Calendar Case Study -- 6.2 Restricted Privileges in Existing Applications -- 7 Related Work -- 8 Conclusion -- References -- Obligations in PTaCL -- 1 Introduction -- 2 PTaCL -- 2.1 Syntax and Semantics -- 2.2 Additional Operators -- 3 Obligations in PTaCL -- 3.1 Defining Obligations in PTaCL -- 3.2 Computing Obligations in PTaCL -- 3.3 Computing Obligations for Derived Policy Operators -- 4 Indeterminacy in PTaCL -- 4.1 Failure of Target Evaluation -- 4.2 Failure of Policy Retrieval -- 5 XACML and Other Related Work -- 6 Conclusion -- References -- Content and Key Management to Trace Traitors in Broadcasting Services -- 1 Introduction -- 1.1 Background -- 1.2 Related Works -- 1.3 Our Contributions -- 2 Preparation: Traitor Tracing Mechanism in [1] -- 3 Proposal: Content and Key Management (CKM) -- 3.1 Content Comparison Attack -- 3.2 Content Management: Slight Modification of Coded Content -- 3.3 Content and Key Management Method -- 3.4 Actual Content and Key Management System -- 3.5 Content and Key Management Method for TTE -- 4 Discussion and Security Analysis -- 4.1 Simplicity of CKM -- 4.2 Security -- 4.3 Transmission Bit Rate -- 5 Conclusion -- References -- Security Analysis, Risk Management, and Usability -- In Cyber-Space No One Can Hear You SCREAM -- 1 Introduction -- 2 Methods -- 3 SCREAM: An RCA for Computer Security -- 3.1 Adapting CREAM as an RCA Technique for Security -- 3.2 Using SCREAM -- 4 Building the Catalog of Attack Modes -- 5 Discussion -- 6 Conclusion -- References -- A Socio-Technical Investigation into Smartphone Security -- 1 Introduction -- 2 Methodology -- 2.1 Interview Protocol -- 2.2 Participants -- 2.3 Analysis -- 3 Results -- 3.1 Lack of Awareness -- 3.2 Lack of Concern -- 3.3 Lack of Self-Efficacy -- 3.4 Lack of Compulsion -- 3.5 Lack of Perseverance -- 4 Model of Precaution Adoption -- 5 Related Work.
6 Conclusions and Future Work -- References -- A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users -- Abstract -- 1 Introduction -- 2 Cyber Security Game -- 2.1 Player Objectives -- 2.2 User -- Defender Game -- 2.3 User-Attacker Game -- 2.4 Attacker-Defender Game -- 3 Related Work -- 4 Conclusions -- Acknowledgments -- References -- Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks -- 1 Introduction -- 2 Related Work -- 3 Requirements for ISC and TM -- 4 Design and Development of ISC and TM -- 4.1 Information Security Contract -- 4.2 Trading Mechanism -- 5 Demonastration: ISC to Hedge Underlying Risk -- 6 Evaluation -- 7 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910483855203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Opere

Altro...

Lingua di pubblicazione

Altro...

Data

Data di pubblicazione

Altro...