Graphical Models for Security [[electronic resource] ] : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 147 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer programming Software engineering Artificial intelligence Computers Computer organization Systems and Data Security Programming Techniques Software Engineering Artificial Intelligence Computing Milieux Computer Systems Organization and Communication Networks |
ISBN | 3-319-74860-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. |
Record Nr. | UNISA-996465299603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 147 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer programming Software engineering Artificial intelligence Computers Computer organization Systems and Data Security Programming Techniques Software Engineering Artificial Intelligence Computing Milieux Computer Systems Organization and Communication Networks |
ISBN | 3-319-74860-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach. |
Record Nr. | UNINA-9910349460503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Graphical Models for Security [[electronic resource] ] : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 103 p. 44 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Software engineering Algorithms Application software Computer logic Systems and Data Security Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Logics and Meanings of Programs |
ISBN | 3-319-29968-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. . |
Record Nr. | UNISA-996465999603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (IX, 103 p. 44 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Software engineering Algorithms Application software Computer logic Systems and Data Security Computer Communication Networks Software Engineering Algorithm Analysis and Problem Complexity Information Systems Applications (incl. Internet) Logics and Meanings of Programs |
ISBN | 3-319-29968-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. . |
Record Nr. | UNINA-9910484309203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Infrastructure [[electronic resource] ] : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings / / edited by Stig F. Mjølsnes, Sjouke Mauw, Sokratis Katsikas |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (X, 239 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer programming Algorithms Information storage and retrieval Application software Computers and civilization Cryptology Programming Techniques Algorithm Analysis and Problem Complexity Information Storage and Retrieval Information Systems Applications (incl. Internet) Computers and Society |
ISBN | 3-540-69485-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talk -- New PKI Protocols Using Tamper Resistant Hardware -- Certificates -- Validation Algorithms for a Secure Internet Routing PKI -- Instant Revocation -- Optimized Certificates – A New Proposal for Efficient Electronic Document Signature Validation -- Authentication -- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model -- Trust-Rated Authentication for Domain-Structured Distributed Systems -- Levels of Assurance and Reauthentication in Federated Environments -- Practice -- Current Status of Japanese Government PKI Systems -- A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System -- Signatures -- Fast Point Decompression for Standard Elliptic Curves -- An Efficient Strong Key-Insulated Signature Scheme and Its Application -- Efficient Generic Forward-Secure Signatures and Proxy Signatures -- Analysis -- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes -- Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks -- Networks -- An Open Mobile Identity Tool: An Architecture for Mobile Identity Management -- PEACHES and Peers. |
Record Nr. | UNISA-996465309403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management [[electronic resource] ] : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (IX, 169 p. 71 illus., 13 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization E-commerce Application software Systems and Data Security Computers and Society e-Commerce/e-business Information Systems Applications (incl. Internet) |
ISBN | 3-030-31511-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Improving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits. |
Record Nr. | UNISA-996466423003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (IX, 169 p. 71 illus., 13 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization E-commerce Application software Systems and Data Security Computers and Society e-Commerce/e-business Information Systems Applications (incl. Internet) |
ISBN | 3-030-31511-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Improving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits. |
Record Nr. | UNINA-9910349278803321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 210 p. 36 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science E-commerce Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems e-Commerce/e-business Cryptology |
ISBN | 3-319-11851-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx. |
Record Nr. | UNISA-996199681703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 210 p. 36 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science E-commerce Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems e-Commerce/e-business Cryptology |
ISBN | 3-319-11851-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx. |
Record Nr. | UNINA-9910483369503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management X : 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings / / edited by Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 191 p. 47 illus.) |
Disciplina | 005.8 |
Collana | IFIP Advances in Information and Communication Technology |
Soggetto topico |
Computers and civilization
Computer security Computers Computers and Society Systems and Data Security Information Systems and Communication Service |
ISBN | 3-319-41354-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Transparency, Privacy and Trust Technology for Tracking and Controlling my Data Disclosures: Does this Work? -- How to Use Information Theory to Mitigate Unfair Rating Attacks -- Enhancing Business Process Models with Trustworthiness Requirements -- A Model for Personalised Perception of Policies -- Evaluation of Privacy-ABC Technologies - A Study on the Computational Efficiency -- A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications -- Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime -- Limitations on Robust Ratings and Predictions -- I Don't Trust ICT: Research Challenges in Cyber Security -- The Wisdom of Being Wise: A Brief Introduction to Computational Wisdom -- Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation -- Towards Behavioural Computer Science -- Improving Interpretations of Trust Claims -- Trust and Regulation Conceptualisation: The Foundation for User-defined Cloud Policies -- A Calculus for Distrust and Mistrust. |
Record Nr. | UNINA-9910255017503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|