top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Graphical Models for Security [[electronic resource] ] : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen
Graphical Models for Security [[electronic resource] ] : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 147 p. 48 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer programming
Software engineering
Artificial intelligence
Computers
Computer organization
Systems and Data Security
Programming Techniques
Software Engineering
Artificial Intelligence
Computing Milieux
Computer Systems Organization and Communication Networks
ISBN 3-319-74860-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach.
Record Nr. UNISA-996465299603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen
Graphical Models for Security : 4th International Workshop, GraMSec 2017, Santa Barbara, CA, USA, August 21, 2017, Revised Selected Papers / / edited by Peng Liu, Sjouke Mauw, Ketil Stolen
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XI, 147 p. 48 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer programming
Software engineering
Artificial intelligence
Computers
Computer organization
Systems and Data Security
Programming Techniques
Software Engineering
Artificial Intelligence
Computing Milieux
Computer Systems Organization and Communication Networks
ISBN 3-319-74860-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Graphical modeling of Security Arguments: Current State and Future Directions -- Evil Twins: Handling Repetitions in Attack - Defense Trees - A Survival Guide -- Visualizing Cyber Security Risks with Bow-Tie Diagrams -- CSIRA: A method for analysing the risk of cybersecurity incidents -- Quantitative Evaluation of Attack Defense Trees using Stochastic Timed Automata -- Probabilistic Modeling of Insider Threat Detection Systems -- Security Modeling for Embedded System Design -- Circle of Health Based Access Control for Personal Health Information Systems -- New Directions in Attack Tree Research: Catching up with Industrial Needs -- Employing Graphical Risk Models to Facilitate Cyber-Risk Monitoring - the WISER Approach.
Record Nr. UNINA-9910349460503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Graphical Models for Security [[electronic resource] ] : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia
Graphical Models for Security [[electronic resource] ] : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (IX, 103 p. 44 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Software engineering
Algorithms
Application software
Computer logic
Systems and Data Security
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Logics and Meanings of Programs
ISBN 3-319-29968-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. .
Record Nr. UNISA-996465999603316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia
Graphical Models for Security : Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers / / edited by Sjouke Mauw, Barbara Kordy, Sushil Jajodia
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (IX, 103 p. 44 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Software engineering
Algorithms
Application software
Computer logic
Systems and Data Security
Computer Communication Networks
Software Engineering
Algorithm Analysis and Problem Complexity
Information Systems Applications (incl. Internet)
Logics and Meanings of Programs
ISBN 3-319-29968-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrated Visualization of Network Security Metadata from Heterogeneous Data Sources -- SysML-Sec Attack Graphs: Compact Representations for Complex Attacks -- Guided Specification and Analysis of a Loyalty Card System -- How to Generate Security Cameras: Towards Defence Generation for Sociotechnical Systems -- Transforming Graphical System Models to Graphical Attack Models -- ATSyRa: An Integrated Environment for Synthesizing Attack Trees. .
Record Nr. UNINA-9910484309203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Infrastructure [[electronic resource] ] : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings / / edited by Stig F. Mjølsnes, Sjouke Mauw, Sokratis Katsikas
Public Key Infrastructure [[electronic resource] ] : 5th European PKI Workshop: Theory and Practice, EuroPKI 2008 Trondheim, Norway, June 16-17, 2008, Proceedings / / edited by Stig F. Mjølsnes, Sjouke Mauw, Sokratis Katsikas
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (X, 239 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer programming
Algorithms
Information storage and retrieval
Application software
Computers and civilization
Cryptology
Programming Techniques
Algorithm Analysis and Problem Complexity
Information Storage and Retrieval
Information Systems Applications (incl. Internet)
Computers and Society
ISBN 3-540-69485-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- New PKI Protocols Using Tamper Resistant Hardware -- Certificates -- Validation Algorithms for a Secure Internet Routing PKI -- Instant Revocation -- Optimized Certificates – A New Proposal for Efficient Electronic Document Signature Validation -- Authentication -- An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model -- Trust-Rated Authentication for Domain-Structured Distributed Systems -- Levels of Assurance and Reauthentication in Federated Environments -- Practice -- Current Status of Japanese Government PKI Systems -- A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System -- Signatures -- Fast Point Decompression for Standard Elliptic Curves -- An Efficient Strong Key-Insulated Signature Scheme and Its Application -- Efficient Generic Forward-Secure Signatures and Proxy Signatures -- Analysis -- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes -- Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks -- Networks -- An Open Mobile Identity Tool: An Architecture for Mobile Identity Management -- PEACHES and Peers.
Record Nr. UNISA-996465309403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti
Security and Trust Management [[electronic resource] ] : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (IX, 169 p. 71 illus., 13 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
E-commerce
Application software
Systems and Data Security
Computers and Society
e-Commerce/e-business
Information Systems Applications (incl. Internet)
ISBN 3-030-31511-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.
Record Nr. UNISA-996466423003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti
Security and Trust Management : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (IX, 169 p. 71 illus., 13 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
E-commerce
Application software
Systems and Data Security
Computers and Society
e-Commerce/e-business
Information Systems Applications (incl. Internet)
ISBN 3-030-31511-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Improving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.
Record Nr. UNINA-9910349278803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Security and Trust Management [[electronic resource] ] : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 210 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
E-commerce
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
Cryptology
ISBN 3-319-11851-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.
Record Nr. UNISA-996199681703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Security and Trust Management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings / / edited by Sjouke Mauw, Christian Damsgaard Jensen
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 210 p. 36 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
E-commerce
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
e-Commerce/e-business
Cryptology
ISBN 3-319-11851-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.
Record Nr. UNINA-9910483369503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trust Management X : 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings / / edited by Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser
Trust Management X : 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Darmstadt, Germany, July 18-22, 2016, Proceedings / / edited by Sheikh Mahbub Habib, Julita Vassileva, Sjouke Mauw, Max Mühlhäuser
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 191 p. 47 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computers and civilization
Computer security
Computers
Computers and Society
Systems and Data Security
Information Systems and Communication Service
ISBN 3-319-41354-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Transparency, Privacy and Trust Technology for Tracking and Controlling my Data Disclosures: Does this Work? -- How to Use Information Theory to Mitigate Unfair Rating Attacks -- Enhancing Business Process Models with Trustworthiness Requirements -- A Model for Personalised Perception of Policies -- Evaluation of Privacy-ABC Technologies - A Study on the Computational Efficiency -- A Trust-Based Framework for Information Sharing Between Mobile Health Care Applications -- Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime -- Limitations on Robust Ratings and Predictions -- I Don't Trust ICT: Research Challenges in Cyber Security -- The Wisdom of Being Wise: A Brief Introduction to Computational Wisdom -- Trust It or Not? An Empirical Study of Rating Mechanism and Its Impact on Smartphone Malware Propagation -- Towards Behavioural Computer Science -- Improving Interpretations of Trust Claims -- Trust and Regulation Conceptualisation: The Foundation for User-defined Cloud Policies -- A Calculus for Distrust and Mistrust.
Record Nr. UNINA-9910255017503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui