top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Information Systems Engineering Workshops : CAiSE 2018 International Workshops, Tallinn, Estonia, June 11-15, 2018, Proceedings / / edited by Raimundas Matulevičius, Remco Dijkman
Advanced Information Systems Engineering Workshops : CAiSE 2018 International Workshops, Tallinn, Estonia, June 11-15, 2018, Proceedings / / edited by Raimundas Matulevičius, Remco Dijkman
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (IX, 279 p. 98 illus.)
Disciplina 658.4038
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Business information services
Software engineering
Information technology - Management
Computer and Information Systems Applications
Business Information Systems
Software Engineering
Enterprise Architecture
Computer Application in Administrative Data Processing
ISBN 3-319-92898-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ASDENCA – Advances in Services DEsign based on the Notion of Capability -- Validation of Capability Modeling Concepts: A Dialogical Approach -- Towards Improving Adaptability of Capability Driven Development Methodology in Complex Environment -- Using Open Data to Support Organizational Capabilities in Dynamic Business Contexts -- Capability Management in the Cloud: Model and Environment -- BDA – Business Data Analytics: Techniques and Applications. -Using BPM Frameworks for Identifying Customer Feedback about Process Performance -- Increasing Trust in (Big) Data Analytics -- Building Payment Classification Models From Rules and Crowdsourced Labels: A Case Study -- BIOC – Blockchains for Inter-Organizational Collaboration -- Towards a Design Space for Blockchain-based System Reengineering -- Ensuring Resource Trust and Integrity in Web Browsers using Blockchain Technology -- Combining Artifact-driven Monitoring with Blockchain: Analysis and Solutions -- Towards Collaborative and Reproducible Scientific Experiments on Blockchain -- Document Management System based on a Private Blockchain for the Support of the Judicial Embargoes Process in Colombia -- COGNISE – Cognitive Aspects of Information Systems Engineering -- The Origin and Evolution of Syntax Errors in Simple Sequence Flow Models in BPMN -- Mining Developers’ Workflows from IDE Usage -- Designing for Information Quality in the Era of Repurposable Crowdsourced User-Generated Content -- Test First, Code Later: Educating for Test Driven Development -- Workshop on Enterprise Modeling -- An Application Design for Reference Enterprise Architecture Models -- The “What” Facet of the Zachman Framework - a Linked Data-driven Interpretation -- Towards an Agile and Ontology-aided Modeling Environment for DSML Adaptation -- Towards a Risk-aware Business Process Modelling Tool Using the ADOxx Platform -- FAiSE – Flexible Advanced Information Systems -- A Reference Framework for Advanced Flexible Information Systems -- Integrating IoT Devices into Business Processes.
Record Nr. UNINA-9910444451303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Databases and Information Systems [[electronic resource] ] : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16–19, 2020, Proceedings / / edited by Tarmo Robal, Hele-Mai Haav, Jaan Penjam, Raimundas Matulevičius
Databases and Information Systems [[electronic resource] ] : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16–19, 2020, Proceedings / / edited by Tarmo Robal, Hele-Mai Haav, Jaan Penjam, Raimundas Matulevičius
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIII, 341 p. 106 illus., 45 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Database management
Application software
Artificial intelligence
Computers
Information storage and retrieval
Database Management
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computing Milieux
Information Storage and Retrieval
Computer Appl. in Social and Behavioral Sciences
ISBN 3-030-57672-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Architectures and Quality of Information Systems -- Artificial Intelligence in Information Systems -- Data and Knowledge Engineering -- Enterprise and Information Systems Engineering -- Security of Information Systems.
Record Nr. UNISA-996465465503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Databases and Information Systems : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16–19, 2020, Proceedings / / edited by Tarmo Robal, Hele-Mai Haav, Jaan Penjam, Raimundas Matulevičius
Databases and Information Systems : 14th International Baltic Conference, DB&IS 2020, Tallinn, Estonia, June 16–19, 2020, Proceedings / / edited by Tarmo Robal, Hele-Mai Haav, Jaan Penjam, Raimundas Matulevičius
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XIII, 341 p. 106 illus., 45 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Database management
Application software
Artificial intelligence
Computers
Information storage and retrieval
Database Management
Information Systems Applications (incl. Internet)
Artificial Intelligence
Computing Milieux
Information Storage and Retrieval
Computer Appl. in Social and Behavioral Sciences
ISBN 3-030-57672-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Architectures and Quality of Information Systems -- Artificial Intelligence in Information Systems -- Data and Knowledge Engineering -- Enterprise and Information Systems Engineering -- Security of Information Systems.
Record Nr. UNINA-9910427720803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Perspectives in Business Informatics Research : 14th International Conference, BIR 2015, Tartu, Estonia, August 26-28, 2015, Proceedings / / edited by Raimundas Matulevičius, Marlon Dumas
Perspectives in Business Informatics Research : 14th International Conference, BIR 2015, Tartu, Estonia, August 26-28, 2015, Proceedings / / edited by Raimundas Matulevičius, Marlon Dumas
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVI, 291 p. 88 illus.)
Disciplina 658.4038
Collana Lecture Notes in Business Information Processing
Soggetto topico Business information services
Application software
Information technology - Management
Electronic data processing - Management
Medical informatics
IT in Business
Computer and Information Systems Applications
Computer Application in Administrative Data Processing
IT Operations
Health Informatics
ISBN 3-319-21915-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynotes -- The Next Wave of Research in Business Process Management -- Liquid Business Process Model Collections: How to Get There -- Business Information Systems Interoperability -- Creation of Smart-Contracting Collaborations for Decentralized Autonomous Organizations -- Reliable Customers and Credible Fixed-Price Contracts for Software Development Projects: A Study of one Supplier's Contracts -- Life Events: a Crucial Point of e-Government -- A Linked Data Model for Web API-s -- Business Information System Requirements and Architecture -- Requirement Elicitation using Business Process Models -- Elements and Characteristics of Enterprise Architecture Capabilities -- Governing IT Services for Quantifying Business Impact -- On Design Research { Some Questions and Answers -- Business Process and Decision Management -- Selecting the \Right" Notation for Business Process Modeling: Experiences from an Industrial Case -- Modeling and Animation of Crisis Management Process with Statecharts -- Change Point Detection and Dealing with Gradual and Multi-Order Dynamics in Process Mining -- Quick Decide { A Tool to Aid the Analytic Hierarchy Process for Group Decisions -- Business Information Systems Development -- The Most Prominent Software Development Concepts Cited in IT Professionals' Blogs -- Towards a Consumer Preference-based Taxonomy for Information Systems Development -- Code Transformation Pattern Alignments and Induction for ERP Legacy Systems Migration -- Passive Condition Pre-Enforcement for Rights Exporting -- Research in Progress -- A Business Process Based Method for Capability Modelling -- Modeling for Viability -- Towards Graphical Query Notation for Semantic Databases -- Conceptualizing a Network Process Model Based Production Platform.
Record Nr. UNINA-9910299248903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure IT Systems [[electronic resource] ] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Secure IT Systems [[electronic resource] ] : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 313 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Data mining
Computers and civilization
Computer organization
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Systems Organization and Communication Networks
ISBN 3-319-70290-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement.
3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection.
4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index.
Record Nr. UNISA-996466460503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Secure IT Systems : 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings / / edited by Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 313 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Application software
Data mining
Computers and civilization
Computer organization
Systems and Data Security
Cryptology
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Systems Organization and Communication Networks
ISBN 3-319-70290-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Invited Talks -- Homomorphic Authentication for Computing Securely on Untrusted Machines -- Security and Privacy Challenges in Machine Learning -- Proof of Stake Blockchain Protocols -- Contents -- Outsourcing Computations -- A Server-Assisted Hash-Based Signature Scheme -- 1 Introduction -- 2 Related Work -- 3 Our Contribution -- 4 Preliminaries -- 5 Description of the Scheme -- 6 Security Proof -- 7 Practical Considerations -- 8 Conclusions and Outlook -- References -- Outsourcing of Verifiable Attribute-Based Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 3 System Model -- 4 ABKS Outsourcing Scheme -- 4.1 Model of ABKS Outsourcing Scheme -- 4.2 Security Definition of ABKS Outsourcing Scheme -- 4.3 Our ABKS Outsourcing Scheme -- 5 VABKS Outsourcing Scheme -- 5.1 Model of VABKS Outsourcing Scheme -- 5.2 Security Definition of VABKS Outsourcing Scheme -- 5.3 Our VABKS Outsourcing Scheme -- 6 Comparison -- 7 Conclusion -- References -- Privacy Preservation -- Is RCB a Leakage Resilient Authenticated Encryption Scheme? -- 1 Introduction -- 2 Preliminaries and Notions -- 3 General Overview of RCB -- 4 Attacks on RCB -- 4.1 Forgery Attack -- 4.2 Attacks on Misuse Resistance -- 4.3 A Denial-of-Service (DoS) Attack -- 4.4 Attack on Full-Duplex Communication -- 5 Privacy by RCB -- 6 Conclusion -- References -- Practical and Secure Searchable Symmetric Encryption with a Small Index -- 1 Introduction -- 1.1 Backgrounds -- 1.2 Our Contributions -- 1.3 Related Works -- 2 Preliminaries -- 3 Bloom Filter -- 4 Proposed Scheme -- 4.1 Constructing an Encrypted Index -- 4.2 Search Protocol -- 5 Security Analysis -- 6 Experimental Results -- References -- Anonymous Certification for an e-Assessment Framework -- 1 Introduction -- 2 Related Work.
3 Anonymous Certification (AC) Construction -- 3.1 Background -- 3.2 Our Construction -- 4 E-learning Use Case for PCS -- 4.1 TeSLA Architecture -- 4.2 Pseudonymity -- 4.3 Integrating Anonymous Certification to TeSLA -- 5 Implementation and Security Details of PCS -- 5.1 Implementation Details -- 5.2 Security Level Sketch of Our Proposal -- 6 Conclusion -- References -- PARTS -- Privacy-Aware Routing with Transportation Subgraphs -- 1 Introduction -- 1.1 Contribution -- 1.2 Structure -- 2 Related Work -- 3 System Model -- 3.1 Road Network -- 3.2 Users -- 3.3 LBS Provider -- 3.4 Adversary -- 4 Strategies for Privacy-Enhanced Routing -- 4.1 Route Parts -- 4.2 Dummy Traffic -- 4.3 Time Shift Requests -- 5 Adversary's Inference Model -- 5.1 Background Knowledge -- 5.2 Empirically Improved Guessing -- 5.3 Privacy Measurement -- 6 Evaluation -- 6.1 Dataset and Simulator -- 6.2 Experimental Setup -- 6.3 Overhead of Segmented Routes -- 6.4 Privacy Related Results -- 6.5 Performance Analysis -- 7 Discussion -- 8 Conclusion -- References -- Security and Privacy in Machine Learning -- Bayesian Network Models in Cyber Security: A Systematic Review -- 1 Introduction -- 2 Review Methodology -- 3 Analysis of Standard Bayesian Network Models in Cyber Security -- 3.1 Citation Details -- 3.2 Data Sources Used to Construct DAGs and Populate CPTs -- 3.3 The Number of Nodes Used in the Model -- 3.4 Type of Threat Actor -- 3.5 Application and Application Sector -- 3.6 Scope of Variables -- 3.7 The Approach(es) Used to Validate Models -- 3.8 Model Purpose and Type of Purpose -- 4 Discussion -- 5 Conclusions and Future Work -- References -- Improving and Measuring Learning Effectiveness at Cyber Defense Exercises -- 1 Introduction -- 2 Learning Measurement Dimensions in CDX's -- 2.1 5-Timestamp Methodology -- 2.2 Data Collection and Sources -- 3 LS17---Learning Measurement.
3.1 5-Timestamp Methodology Experience -- 3.2 Discussion and Findings from LS17 Learning Measurement -- 4 Related Work in Learning Measurement Context -- 5 Conclusion -- References -- Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data -- 1 Introduction -- 2 Preliminaries -- 2.1 Secure Multiparty Computation -- 2.2 Notation -- 2.3 General FIM Algorithms -- 3 Privacy-Preserving FIM -- 3.1 Algorithms for Privacy Preserving FIM -- 3.2 Comparing Bit Matrix and Set Based Approaches -- 3.3 Combining Dense and Sparse Representations -- 4 Benchmarks -- 5 Conclusion -- References -- Applications -- Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets -- 1 Introduction -- 2 Ceremony Description -- 2.1 Description of Mobilpendlerkort -- 2.2 Building the Inspection Ceremony -- 3 Attack Demonstration -- 3.1 Barcode Analysis -- 3.2 Primary Screen Forgery -- 3.3 Extra Zone Ticket Forgery -- 4 Principles -- 5 Alternative Inspection Ceremony -- 6 Related Work -- 7 Conclusions -- References -- Using the Estonian Electronic Identity Card for Authentication to a Machine -- 1 Introduction -- 2 Card Authentication -- 2.1 Document Expiration and Revocation Checks -- 2.2 Card Impersonation -- 3 Attacks by Malicious Terminals -- 3.1 Compromising the Cardholder's Privacy -- 3.2 Denial-of-Service Attacks -- 3.3 Unauthorized Use of Private Keys -- 4 Design of ID Card Emulator -- 4.1 Card ATR Adjustment -- 4.2 APDU Logging Functionality -- 4.3 Visual Imitation of ID Card -- 5 Card Authentication in Practice -- 6 Discussion: Improvements -- 6.1 Cloning Prevention -- 6.2 Cardholder Verification -- 6.3 Contactless Interface -- 7 Conclusion -- References -- Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure -- 1 Introduction -- 2 Related Work -- 3 Statistical Tests for Ransomware Attacks Detection.
4 Towards a Generic and Practical Ransomware Countermeasure -- 4.1 File System Activity Monitoring -- 4.2 Implementation Design -- 4.3 A Single Indicator of Compromise -- 5 Experiments: Performance Evaluation -- 5.1 Disk Performance -- 5.2 CPU Performance -- 5.3 Discussion -- 6 Experiments: Ransomware Detection -- 6.1 Malware - O - Matic -- 6.2 Experimental Setup -- 6.3 Detection Results -- 6.4 Ransomware-Like Applications -- 7 Conclusions -- References -- A Large-Scale Analysis of Download Portals and Freeware Installers -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Analysis System Overview -- 3.2 Installer Crawling -- 4 Results -- 4.1 Static Properties of the Installers -- 4.2 Dynamic Analysis of Installers -- 4.3 App Managers and Software Updates -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Access Control -- GPASS: A Password Manager with Group-Based Access Control -- 1 Introduction -- 2 Related Work -- 3 Models and Assumptions -- 3.1 System Model -- 3.2 Threat Model -- 3.3 System Goals -- 3.4 Security Goals -- 4 GPASS -- 4.1 Overview -- 4.2 Fundamental Operations -- 5 Security Analysis -- 6 Extended GPASS -- 7 Implementation -- 8 Discussion -- 9 Conclusion -- References -- Towards Accelerated Usage Control Based on Access Correlations -- 1 Introduction -- 2 The Problem -- 3 Our Approach: SPEEDAC -- 3.1 Speculative Pre-computation of Decisions -- 3.2 Utilization of Access Correlations -- 3.3 Perceivable Overhead -- 4 Case Study -- 5 Enforcement Mechanism -- 5.1 Design Space -- 5.2 Design for Effectiveness -- 5.3 Implementation -- 6 Performance Evaluation -- 6.1 Experimental Setup -- 6.2 Perceivable Overhead -- 6.3 File-Correlation Effects -- 7 Related Work -- 8 Conclusion -- References -- Emerging Security Areas -- Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs.
1 Introduction -- 2 Control Flow Graph Transcompilation -- 2.1 Prerequisites -- 2.2 Overview of Our Approach -- 2.3 Contexts -- 2.4 Node Passivation -- 2.5 Jumps and Internal Calls -- 2.6 Routing -- 3 Control Flow Graph Obfuscation -- 3.1 Forcing Execution -- 3.2 Node Hiding -- 3.3 Route Hiding -- 4 Security -- 4.1 Security Against Dynamic Analysis -- 5 Implementation -- 6 Conclusion -- References -- Proof of a Shuffle for Lattice-Based Cryptography -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Ideal Lattices -- 2.2 RLWE Encryption Scheme -- 2.3 Zero Knowledge Proofs -- 2.4 Pedersen Commitments -- 3 Shuffling Ring-LWE Encryptions -- 3.1 Protocol Overview -- 3.2 Proof of Knowledge of Permutation Matrix -- 3.3 Proof of Knowledge of Small Exponents -- 3.4 Opening the Commitments -- 4 Conclusions -- References -- An Analysis of Bitcoin Laundry Services -- 1 Introduction to Tumblers -- 2 Results -- 2.1 DarkLaunder, Bitlaunder and CoinMixer -- 2.2 Helix -- 2.3 Alphabay -- 3 Conclusions -- References -- Author Index.
Record Nr. UNINA-9910483725903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui