Engineering Secure Future Internet Services and Systems [[electronic resource] ] : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (VIII, 393 p. 131 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Management information systems Computer science Computer logic Application software Data encryption (Computer science) Systems and Data Security Software Engineering Management of Computing and Information Systems Logics and Meanings of Programs Information Systems Applications (incl. Internet) Cryptology |
ISBN | 3-319-07452-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health. |
Record Nr. | UNISA-996217780903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Future Internet Services and Systems : Current Research / / edited by Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , 2014 |
Descrizione fisica | 1 recurso en línea (VIII, 393 p. 131 illus.) |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Management information systems Computer science Computer logic Application software Data encryption (Computer science) Seguridad informática Systems and Data Security Software Engineering Management of Computing and Information Systems Logics and Meanings of Programs Information Systems Applications (incl. Internet) Cryptology |
ISBN |
3-319-07452-0
9783319074511 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Structured Comparison of Security Standards -- Empirical Assessment of Security Requirements and Architecture: Lessons Learned -- STS-Tool: Security Requirements Engineering for Socio-Technical Systems -- Model-Driven Development of a Secure eHealth Application -- Modeling Security Features of Web Applications -- On the Synthesis of Secure Services Composition -- Privacy and Access Control in Federated Social Networks -- Engineering Trust-Awareness and Self-adaptability in Services and Systems -- Validation of Access Control Systems -- Evaluation of Engineering Approaches in the Secure Software Development Life Cycle -- A Toolchain for Designing and Testing Access Control Policies -- Verification of Authorization Policies Modified by Delegation -- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System -- Divide and Conquer – Towards a Notion of Risk Model Encapsulation -- Preserving Data Privacy in e-Health. |
Record Nr. | UNINA-9910484706603321 |
Cham : , : Springer International Publishing : , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communications Security [[electronic resource] ] : 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010 Proceedings / / edited by Miguel Soriano, Sihan Qing, Javier López |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIV, 474 p. 120 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Data structures (Computer science) Coding theory Information theory Algorithms Computer communication systems Systems and Data Security Cryptology Data Structures and Information Theory Coding and Information Theory Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN |
1-280-39076-X
9786613568687 3-642-17650-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Hash Functions: Theory and Practice -- Cryptographic Hash Functions: Theory and Practice -- Session 1A. Access Control -- Rewriting of SPARQL/Update Queries for Securing Data Access -- Fine-Grained Disclosure of Access Policies -- Session 1B. Public Key Cryptography and Cryptanalysis -- Manger’s Attack Revisited -- Horizontal Correlation Analysis on Exponentiation -- Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts -- Session 1C. Security in Distributed and Mobile Systems -- A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks -- CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization -- SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms -- Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol -- Compromise-Resilient Anti-jamming for Wireless Sensor Networks -- Session 1D. Cryptanalysis -- On Practical Second-Order Power Analysis Attacks for Block Ciphers -- Consecutive S-box Lookups: A Timing Attack on SNOW 3G -- Session 2A. Authentication -- Efficient Authentication for Mobile and Pervasive Computing -- Security Enhancement and Modular Treatment towards Authenticated Key Exchange -- Federated Secret Handshakes with Support for Revocation -- Session 2B. Fair Exchange Protocols -- An Agent-Mediated Fair Exchange Protocol -- A New Method for Formalizing Optimistic Fair Exchange Protocols -- Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme -- Session 2C. Anonymity and Privacy -- Proving Coercion-Resistance of Scantegrity II -- Anonymity and Verifiability in Voting: Understanding (Un)Linkability -- A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms -- Time Warp: How Time Affects Privacy in LBSs -- Session 2D. Software Security -- Return-Oriented Rootkit without Returns (on the x86) -- Experimental Threat Model Reuse with Misuse Case Diagrams -- Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis -- Session 3A. Proxy Cryptosystems -- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities -- Ciphertext Policy Attribute-Based Proxy Re-encryption -- Session 3B. Intrusion Detection Systems -- Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks -- A Trust-Based IDS for the AODV Protocol -- IDS Alert Visualization and Monitoring through Heuristic Host Selection -- A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. |
Record Nr. | UNISA-996466020503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security [[electronic resource] ] : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 572 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Operating Systems Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN |
3-540-30191-7
3-540-23563-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. |
Record Nr. | UNISA-996465286403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security : 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004. Proceedings / / edited by Javier López, Eiji Okamoto |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (XII, 572 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Management information systems Computer science Algorithms Computer networks Cryptology Discrete Mathematics in Computer Science Operating Systems Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN |
3-540-30191-7
3-540-23563-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | On the Minimal Assumptions of Group Signature Schemes -- Perfect Concurrent Signature Schemes -- New Identity-Based Ring Signature Schemes -- On the Security of a Multi-party Certified Email Protocol -- Robust Metering Schemes for General Access Structures -- PayFlux – Secure Electronic Payment in Mobile Ad Hoc Networks -- Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN -- Provably Secure Authenticated Tree Based Group Key Agreement -- Taxonomic Consideration to OAEP Variants and Their Security -- Factorization-Based Fail-Stop Signatures Revisited -- A Qualitative Evaluation of Security Patterns -- Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases -- Volatile Memory Computer Forensics to Detect Kernel Level Compromise -- A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet -- Hydan: Hiding Information in Program Binaries -- A Semi-fragile Steganographic Digital Signature for Images -- Identification of Traitors Using a Trellis -- Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation -- Reflector Attack Traceback System with Pushback Based iTrace Mechanism -- Automatic Covert Channel Analysis of a Multilevel Secure Component -- Sound Approximations to Diffie-Hellman Using Rewrite Rules -- On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks -- New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm -- Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure -- Modelling Dependencies Between Classifiers in Mobile Masquerader Detection -- Threat Analysis on NEtwork MObility (NEMO) -- Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept -- Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) -- Secret-Public Storage Trade-Off for Broadcast Encryption Key Management -- Security Analysis of the Generalized Self-shrinking Generator -- On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario -- Transient Fault Induction Attacks on XTR -- Adaptive-CCA on OpenPGP Revisited -- A New Key-Insulated Signature Scheme -- Secure Hierarchical Identity Based Signature and Its Application -- Multi-designated Verifiers Signatures -- Dynamic Access Control for Multi-privileged Group Communications -- An Efficient Authentication Scheme Using Recovery Information in Signature -- Time-Scoped Searching of Encrypted Audit Logs -- Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. |
Record Nr. | UNINA-9910144344703321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.4 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN | 1-5090-9476-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996197577803316 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
SecPerU 2006 : Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing : proceedings : 29 June, 2006, Lyon, France |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE Computer Society, 2006 |
Disciplina | 005.4 |
Soggetto topico |
Ubiquitous computing - Security measures
Wireless communication systems Engineering & Applied Sciences Computer Science |
ISBN |
9781509094769
1509094768 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145620503321 |
[Place of publication not identified], : IEEE Computer Society, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 235 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Computer communication systems Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-22906-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology. |
Record Nr. | UNISA-996200367403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust, Privacy and Security in Digital Business : 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings / / edited by Simone Fischer-Hübner, Costas Lambrinoudakis, Javier López |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 235 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Computer communication systems Systems and Data Security Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-22906-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attributes Enhanced Role-Based Access Control -- Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile -- VISIO: a Visual Approach for Singularity Detection in Recommendation Systems -- Hidden in Plain Sight: SDP-based Covert Channel for Botnet Communication -- The Design of a Configurable Reputation Service -- Attacking GSM Networks as a Script Kiddie Using Commodity Hardware and Software -- On the Efficacy of Static Features to Detect Malicious Applications in Android -- Protecting Android Apps against Reverse Engineering by the Use of the Native Code -- Designing Privacy-Aware Systems in the Cloud -- Accountability-Preserving Anonymous Delivery of Cloud Services -- Till All Are One: Towards a Unified Cloud IDS -- Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes -- Identifying Factors that Influence Employees' Security Behavior for Enhancing ISP Compliance -- Dynamic Deployment and Monitoring of Security Policies -- A Taxonomy of Requirements for the Privacy Goal Transparency -- A Privacy Preserving Framework for Big Data in e-Government Environments -- Privacy Principles: Towards a Common Privacy Audit Methodology. |
Record Nr. | UNINA-9910485027503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy, and Security in Digital Business [[electronic resource] ] : 10th International Conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013. Proceedings / / edited by Steven Furnell, Costas Lambrinoudakis, Javier López |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 199 p. 54 illus.) |
Disciplina | 006.312 |
Collana | Security and Cryptology |
Soggetto topico |
Data mining
Database management Artificial intelligence Data Mining and Knowledge Discovery Database Management Artificial Intelligence |
ISBN | 3-642-40343-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Access control and authentication -- Identity and trust management -- privacy and confidentiality management -- Information systems security -- Security policies/legal issues.- Trust and privacy in mobile and pervasive environments. |
Record Nr. | UNISA-996465704503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|