Advanced Research in Data Privacy [[electronic resource] /] / edited by Guillermo Navarro-Arribas, Vicenç Torra |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (IX, 463 p. 72 illus., 18 illus. in color.) |
Disciplina | 006.3 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Artificial intelligence Application software Computational Intelligence Artificial Intelligence Information Systems Applications (incl. Internet) |
ISBN | 3-319-09885-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Respondent Privacy -- User Privacy. |
Record Nr. | UNINA-9910299846103321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I |
Autore | Katsikas Sokratis |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (518 pages) |
Altri autori (Persone) |
Cuppensédéric
Cuppens-BoulahiaNora LambrinoudakisCostas Garcia-AlfaroJoaquin Navarro-ArribasGuillermo NespoliPantaleone KalloniatisChristos MylopoulosJohn AntónAnnie |
Collana | Lecture Notes in Computer Science Series |
ISBN | 3-031-54204-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents - Part I -- Contents - Part II -- Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain -- 1 Introduction -- 2 Related Work -- 2.1 Supply Chain Cyber Security -- 2.2 Cyber Security Culture -- 3 Method -- 3.1 Problem Identification and Literature Review -- 3.2 Data Collection and Analysis -- 3.3 Data Interpretation and Reporting -- 4 Results -- 4.1 Governance -- 4.2 Preparedness and Incident Response -- 4.3 Supply Chain Challenges -- 4.4 Trust -- 4.5 Looking Towards Others and Propagation of Trust -- 4.6 The Impact of Organization Size -- 5 Discussion -- 5.1 Discussion of Main Research Questions -- 5.2 Exploration of Additional Findings -- 6 Conclusion and Future Work -- References -- METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks -- 1 Introduction -- 2 Cybersecurity Research for ICSs -- 2.1 Testbeds -- 2.2 Datasets -- 2.3 Related Work -- 2.4 Toward a Cross-Domain ICS Evaluation -- 3 METRICS: A Cybersecurity Evaluation Methodology for ICSs -- 3.1 Exchangeable Evaluation Environment -- 3.2 Adversaries and Responses -- 3.3 Cross-Domain Metrics -- 3.4 Evaluation Control -- 4 Use Case: METRICS for Power Grids -- 4.1 Evaluation Phases -- 4.2 Discussion -- 5 Toward Cross-Domain Resilience -- 6 Conclusion -- A Environment Description File Example -- B Scenario Description File Example -- References -- Threat Analysis in Dairy Farming 4.0 -- 1 Introduction -- 2 Related Work -- 3 CPSs of a Dairy Farm 4.0 -- 4 Threat Modeling and Risk Assessment -- 4.1 Methodology -- 4.2 Threats and Risks in the Dairy Farm 4.0 -- 5 Conclusions -- References -- Overview of Social Engineering Protection and Prevention Methods -- 1 Introduction -- 2 Method Selection Methodology -- 3 Analysis -- 3.1 Overview of Protection Method Categories.
3.2 Criteria for Method Evaluation -- 3.3 Evaluation Results -- 3.4 Analysis of Evaluation Results -- 4 Conclusion -- References -- Skade - A Challenge Management System for Cyber Threat Hunting -- 1 Introduction -- 2 Related Work -- 3 Hypotheses Concerning Threat Hunting Training -- 3.1 Ensuring Constructive Alignment -- 3.2 Supporting Motivating Setting -- 3.3 Providing Feedback and Assessment -- 3.4 Covering Multiple Learning Dimensions -- 4 Realization of the Challenge Manager Skade -- 4.1 Features -- 4.2 Functions -- 4.3 Example Based on the Nordic-US Exercise of 2023 -- 5 Discussion -- 5.1 Skade as a Design Science Effort -- 5.2 Trainees and Requirements on Challenges -- 5.3 Interaction with Emulators -- 5.4 Learning Objectives and Learning Activities -- 5.5 Experiment Plan and Tests of Hypotheses -- 6 Conclusion -- References -- On the Usage of NLP on CVE Descriptions for Calculating Risk -- 1 Introduction -- 2 Cybersecurity Related Background -- 2.1 Common Vulnerabilities and Exposures (CVE) -- 2.2 Common Platform Enumeration (CPE) -- 2.3 Common Weakness Enumeration (CWE) -- 2.4 Common Attack Pattern Enumeration and Classification (CAPEC) -- 2.5 National Vulnerability Database (NVD) -- 2.6 Common Vulnerability Scoring System (CVSS) -- 3 Related Work -- 4 Natural Language Processing Background -- 4.1 Text Classification -- 4.2 spaCy -- 5 Implementation -- 6 Conclusion -- References -- Evaluation of an OPC UA-Based Access Control Enforcement Architecture -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Protocol Modeling -- 4 Implementation -- 5 Experiment -- 6 Results -- 6.1 Results on Connection Experiments -- 6.2 Results on Access Resource Experiments -- 6.3 Results on Different Token Expiry Times -- 6.4 Result on Different Token Sizes -- 6.5 Results on Lowering the CPU Clock Frequency of the Resource Server. 7 Suggestions on Optimizations of Session Activation -- 8 Discussion -- 8.1 Recommendations -- 8.2 Limitations and Impact -- 9 Conclusions -- References -- HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments -- 1 Introduction -- 2 Background -- 2.1 Internet Exchange Point -- 2.2 Honeypot -- 2.3 Vehicle-to-Grid (V2G) -- 3 Related Work -- 4 HoneyEVSE Honeypot -- 4.1 Architecture -- 4.2 Physical Process -- 4.3 Services and Interaction -- 4.4 Data Logging -- 5 Results -- 5.1 Interactions Analysis -- 5.2 Interactions Origin -- 6 Conclusion -- References -- DPM 2023 -- Foreword from the DPM 2023 Program Chairs -- 18th International Workshop on Data Privacy Management - DPM 2023 -- PC Chairs -- Program Committee -- Steering Committee -- Additional Reviewers -- Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce -- 1 Introduction -- 2 Background -- 3 Methodology and Research Strategy -- 3.1 Research Questions -- 4 Results -- 4.1 The `old' Ethical Dilemmas of E-Commerce -- 4.2 The `New' Ethical Dilemmas of E-Commerce -- 5 Conclusions -- References -- Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Synthetic Data Generation -- 2.2 Membership Inference Attacks Against Synthetic Tabular Data -- 3 Attack Scenarios -- 3.1 (S0) Auxiliary -- 3.2 (S1) Black Box -- 3.3 (S2) Published -- 3.4 (S3) Upper Bound -- 4 Experimental Setup -- 4.1 Synthetic Data Generators -- 4.2 Real World Datasets -- 4.3 Meta-classifier Methods -- 4.4 Parameters of the Attack -- 5 Results -- 5.1 Query Based Attack -- 5.2 Target Attention Attack -- 5.3 Robustness Analysis for Number of Synthetic Records m -- 6 Future Work -- 6.1 Impact of Releasing Less Synthetic Records. 6.2 Differentially Private Synthetic Generation Methods -- 6.3 Bridging the Gap with the Upper Bound -- 7 Conclusion -- References -- Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption -- 1 Introduction -- 2 Proxy Re-Encryption -- 2.1 Syntax and Basic Definitions -- 2.2 Umbral's PRE Scheme -- 3 Related Work -- 4 Patient-Centric Health Data Sovereignty -- 4.1 Proposed Solution -- 4.2 Authentication/Authorisation -- 4.3 Access Delegation Scenario -- 4.4 Break-Glass Approach -- 5 Performance Analysis -- 6 Conclusion -- References -- PrivacySmart: Automatic and Transparent Management of Privacy Policies -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution and Plan of This Paper -- 2 Proposal Description -- 2.1 System Architecture Overview -- 2.2 User Privacy Preferences -- 2.3 Pop-Up Interaction Module -- 2.4 Consent Smart Contract -- 2.5 Workflow -- 3 Discussion -- 3.1 Implementation -- 3.2 Evaluation -- 4 Conclusions and Future Work -- References -- Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Collection of VTO Providers, Websites and Apps -- 3.2 Analyzing the Sharing of Users' Images on VTO Websites/Apps -- 3.3 Analyzing Privacy Policies w.r.t VTO Feature -- 3.4 Measurement of Trackers -- 3.5 Analysing VTO Service Providers -- 4 Results -- 4.1 Sharing of Users' Images on VTO Featuring Websites -- 4.2 Privacy Policy Analysis w.r.t VTO Feature on Websites -- 4.3 Sharing of Users' Images on VTO Featuring Apps -- 4.4 Privacy Policy Analysis w.r.t VTO Feature on Apps -- 4.5 Measurement of Trackers -- 4.6 Analysis of VTO Service Providers -- 5 Conclusion -- References -- Integrally Private Model Selection for Support Vector Machine -- 1 Introduction -- 2 Preliminaries -- 2.1 Support Vector Machine (SVM). 2.2 Model Comparison Attack for SVM and Integral Privacy -- 3 Methodology -- 3.1 Overview -- 3.2 Datasets -- 3.3 Creation of Partitions -- 3.4 Integrally Private SVM (IPSVM) -- 4 Results -- 4.1 Drawbacks -- 5 Conclusion and Future Work -- References -- Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach -- 1 Introduction -- 2 Preliminaries -- 2.1 Federated Learning -- 2.2 Differential Privacy -- 2.3 Temporal Fusion Transformers -- 3 Related Work -- 4 Differentially Private Federated Traffic Flow Prediction Using Temporal Fusion Transformers -- 4.1 Client-Side Training -- 4.2 Model Perturbation -- 4.3 Aggregation Algorithm -- 5 Dataset and Experimental Settings -- 6 Results and Analysis -- 7 Conclusion and Future Works -- References -- Analyzing Continuous Ks-Anonymization for Smart Meter Data -- 1 Introduction -- 2 Problem Statement and Related Work -- 3 ks-Anonymity and CASTLE -- 4 Evaluation -- 5 Conclusion -- References -- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges -- 1 Introduction -- 2 Industrial Context -- 3 Background -- 4 Available Libraries -- 4.1 HElib -- 4.2 SEAL -- 4.3 PALISADE -- 4.4 OpenFHE -- 4.5 TFHE -- 4.6 Concrete -- 4.7 LATTIGO -- 5 Towards Real-World HE Applications: HELT -- 6 Related Work -- 7 Conclusion -- References -- AddShare: A Privacy-Preserving Approach for Federated Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Federated Learning Attacks -- 2.2 Privacy in Federated Learning -- 3 The AddShare Approach -- 3.1 Threat Models -- 3.2 AddShare Algorithm -- 3.3 Implemented AddShare Variants -- 4 Empirical Evaluation -- 5 Results and Discussion -- 6 Conclusion -- References -- Secure Multiparty Sampling of a Biased Coin for Differential Privacy -- 1 Introduction -- 1.1 Other Background and Related Works. 1.2 Contribution. |
Record Nr. | UNINA-9910842291903321 |
Katsikas Sokratis
![]() |
||
Cham : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer Security. ESORICS 2023 International Workshops : CyberICS, DPM, CBT, and SECPRE, the Hague, the Netherlands, September 25-29, 2023, Revised Selected Papers, Part I |
Autore | Katsikas Sokratis |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (518 pages) |
Altri autori (Persone) |
Cuppensédéric
Cuppens-BoulahiaNora LambrinoudakisCostas Garcia-AlfaroJoaquin Navarro-ArribasGuillermo NespoliPantaleone KalloniatisChristos MylopoulosJohn AntónAnnie |
Collana | Lecture Notes in Computer Science Series |
ISBN | 3-031-54204-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents - Part I -- Contents - Part II -- Effects of Organizational Cyber Security Culture Across the Energy Sector Supply Chain -- 1 Introduction -- 2 Related Work -- 2.1 Supply Chain Cyber Security -- 2.2 Cyber Security Culture -- 3 Method -- 3.1 Problem Identification and Literature Review -- 3.2 Data Collection and Analysis -- 3.3 Data Interpretation and Reporting -- 4 Results -- 4.1 Governance -- 4.2 Preparedness and Incident Response -- 4.3 Supply Chain Challenges -- 4.4 Trust -- 4.5 Looking Towards Others and Propagation of Trust -- 4.6 The Impact of Organization Size -- 5 Discussion -- 5.1 Discussion of Main Research Questions -- 5.2 Exploration of Additional Findings -- 6 Conclusion and Future Work -- References -- METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyberattacks -- 1 Introduction -- 2 Cybersecurity Research for ICSs -- 2.1 Testbeds -- 2.2 Datasets -- 2.3 Related Work -- 2.4 Toward a Cross-Domain ICS Evaluation -- 3 METRICS: A Cybersecurity Evaluation Methodology for ICSs -- 3.1 Exchangeable Evaluation Environment -- 3.2 Adversaries and Responses -- 3.3 Cross-Domain Metrics -- 3.4 Evaluation Control -- 4 Use Case: METRICS for Power Grids -- 4.1 Evaluation Phases -- 4.2 Discussion -- 5 Toward Cross-Domain Resilience -- 6 Conclusion -- A Environment Description File Example -- B Scenario Description File Example -- References -- Threat Analysis in Dairy Farming 4.0 -- 1 Introduction -- 2 Related Work -- 3 CPSs of a Dairy Farm 4.0 -- 4 Threat Modeling and Risk Assessment -- 4.1 Methodology -- 4.2 Threats and Risks in the Dairy Farm 4.0 -- 5 Conclusions -- References -- Overview of Social Engineering Protection and Prevention Methods -- 1 Introduction -- 2 Method Selection Methodology -- 3 Analysis -- 3.1 Overview of Protection Method Categories.
3.2 Criteria for Method Evaluation -- 3.3 Evaluation Results -- 3.4 Analysis of Evaluation Results -- 4 Conclusion -- References -- Skade - A Challenge Management System for Cyber Threat Hunting -- 1 Introduction -- 2 Related Work -- 3 Hypotheses Concerning Threat Hunting Training -- 3.1 Ensuring Constructive Alignment -- 3.2 Supporting Motivating Setting -- 3.3 Providing Feedback and Assessment -- 3.4 Covering Multiple Learning Dimensions -- 4 Realization of the Challenge Manager Skade -- 4.1 Features -- 4.2 Functions -- 4.3 Example Based on the Nordic-US Exercise of 2023 -- 5 Discussion -- 5.1 Skade as a Design Science Effort -- 5.2 Trainees and Requirements on Challenges -- 5.3 Interaction with Emulators -- 5.4 Learning Objectives and Learning Activities -- 5.5 Experiment Plan and Tests of Hypotheses -- 6 Conclusion -- References -- On the Usage of NLP on CVE Descriptions for Calculating Risk -- 1 Introduction -- 2 Cybersecurity Related Background -- 2.1 Common Vulnerabilities and Exposures (CVE) -- 2.2 Common Platform Enumeration (CPE) -- 2.3 Common Weakness Enumeration (CWE) -- 2.4 Common Attack Pattern Enumeration and Classification (CAPEC) -- 2.5 National Vulnerability Database (NVD) -- 2.6 Common Vulnerability Scoring System (CVSS) -- 3 Related Work -- 4 Natural Language Processing Background -- 4.1 Text Classification -- 4.2 spaCy -- 5 Implementation -- 6 Conclusion -- References -- Evaluation of an OPC UA-Based Access Control Enforcement Architecture -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Protocol Modeling -- 4 Implementation -- 5 Experiment -- 6 Results -- 6.1 Results on Connection Experiments -- 6.2 Results on Access Resource Experiments -- 6.3 Results on Different Token Expiry Times -- 6.4 Result on Different Token Sizes -- 6.5 Results on Lowering the CPU Clock Frequency of the Resource Server. 7 Suggestions on Optimizations of Session Activation -- 8 Discussion -- 8.1 Recommendations -- 8.2 Limitations and Impact -- 9 Conclusions -- References -- HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply Equipments -- 1 Introduction -- 2 Background -- 2.1 Internet Exchange Point -- 2.2 Honeypot -- 2.3 Vehicle-to-Grid (V2G) -- 3 Related Work -- 4 HoneyEVSE Honeypot -- 4.1 Architecture -- 4.2 Physical Process -- 4.3 Services and Interaction -- 4.4 Data Logging -- 5 Results -- 5.1 Interactions Analysis -- 5.2 Interactions Origin -- 6 Conclusion -- References -- DPM 2023 -- Foreword from the DPM 2023 Program Chairs -- 18th International Workshop on Data Privacy Management - DPM 2023 -- PC Chairs -- Program Committee -- Steering Committee -- Additional Reviewers -- Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce -- 1 Introduction -- 2 Background -- 3 Methodology and Research Strategy -- 3.1 Research Questions -- 4 Results -- 4.1 The `old' Ethical Dilemmas of E-Commerce -- 4.2 The `New' Ethical Dilemmas of E-Commerce -- 5 Conclusions -- References -- Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic Data -- 1 Introduction -- 2 Background and Related Work -- 2.1 Synthetic Data Generation -- 2.2 Membership Inference Attacks Against Synthetic Tabular Data -- 3 Attack Scenarios -- 3.1 (S0) Auxiliary -- 3.2 (S1) Black Box -- 3.3 (S2) Published -- 3.4 (S3) Upper Bound -- 4 Experimental Setup -- 4.1 Synthetic Data Generators -- 4.2 Real World Datasets -- 4.3 Meta-classifier Methods -- 4.4 Parameters of the Attack -- 5 Results -- 5.1 Query Based Attack -- 5.2 Target Attention Attack -- 5.3 Robustness Analysis for Number of Synthetic Records m -- 6 Future Work -- 6.1 Impact of Releasing Less Synthetic Records. 6.2 Differentially Private Synthetic Generation Methods -- 6.3 Bridging the Gap with the Upper Bound -- 7 Conclusion -- References -- Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-Encryption -- 1 Introduction -- 2 Proxy Re-Encryption -- 2.1 Syntax and Basic Definitions -- 2.2 Umbral's PRE Scheme -- 3 Related Work -- 4 Patient-Centric Health Data Sovereignty -- 4.1 Proposed Solution -- 4.2 Authentication/Authorisation -- 4.3 Access Delegation Scenario -- 4.4 Break-Glass Approach -- 5 Performance Analysis -- 6 Conclusion -- References -- PrivacySmart: Automatic and Transparent Management of Privacy Policies -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution and Plan of This Paper -- 2 Proposal Description -- 2.1 System Architecture Overview -- 2.2 User Privacy Preferences -- 2.3 Pop-Up Interaction Module -- 2.4 Consent Smart Contract -- 2.5 Workflow -- 3 Discussion -- 3.1 Implementation -- 3.2 Evaluation -- 4 Conclusions and Future Work -- References -- Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Collection of VTO Providers, Websites and Apps -- 3.2 Analyzing the Sharing of Users' Images on VTO Websites/Apps -- 3.3 Analyzing Privacy Policies w.r.t VTO Feature -- 3.4 Measurement of Trackers -- 3.5 Analysing VTO Service Providers -- 4 Results -- 4.1 Sharing of Users' Images on VTO Featuring Websites -- 4.2 Privacy Policy Analysis w.r.t VTO Feature on Websites -- 4.3 Sharing of Users' Images on VTO Featuring Apps -- 4.4 Privacy Policy Analysis w.r.t VTO Feature on Apps -- 4.5 Measurement of Trackers -- 4.6 Analysis of VTO Service Providers -- 5 Conclusion -- References -- Integrally Private Model Selection for Support Vector Machine -- 1 Introduction -- 2 Preliminaries -- 2.1 Support Vector Machine (SVM). 2.2 Model Comparison Attack for SVM and Integral Privacy -- 3 Methodology -- 3.1 Overview -- 3.2 Datasets -- 3.3 Creation of Partitions -- 3.4 Integrally Private SVM (IPSVM) -- 4 Results -- 4.1 Drawbacks -- 5 Conclusion and Future Work -- References -- Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approach -- 1 Introduction -- 2 Preliminaries -- 2.1 Federated Learning -- 2.2 Differential Privacy -- 2.3 Temporal Fusion Transformers -- 3 Related Work -- 4 Differentially Private Federated Traffic Flow Prediction Using Temporal Fusion Transformers -- 4.1 Client-Side Training -- 4.2 Model Perturbation -- 4.3 Aggregation Algorithm -- 5 Dataset and Experimental Settings -- 6 Results and Analysis -- 7 Conclusion and Future Works -- References -- Analyzing Continuous Ks-Anonymization for Smart Meter Data -- 1 Introduction -- 2 Problem Statement and Related Work -- 3 ks-Anonymity and CASTLE -- 4 Evaluation -- 5 Conclusion -- References -- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open Challenges -- 1 Introduction -- 2 Industrial Context -- 3 Background -- 4 Available Libraries -- 4.1 HElib -- 4.2 SEAL -- 4.3 PALISADE -- 4.4 OpenFHE -- 4.5 TFHE -- 4.6 Concrete -- 4.7 LATTIGO -- 5 Towards Real-World HE Applications: HELT -- 6 Related Work -- 7 Conclusion -- References -- AddShare: A Privacy-Preserving Approach for Federated Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Federated Learning Attacks -- 2.2 Privacy in Federated Learning -- 3 The AddShare Approach -- 3.1 Threat Models -- 3.2 AddShare Algorithm -- 3.3 Implemented AddShare Variants -- 4 Empirical Evaluation -- 5 Results and Discussion -- 6 Conclusion -- References -- Secure Multiparty Sampling of a Biased Coin for Differential Privacy -- 1 Introduction -- 1.1 Other Background and Related Works. 1.2 Contribution. |
Record Nr. | UNISA-996587860003316 |
Katsikas Sokratis
![]() |
||
Cham : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 5th International Workshop, DPM 2010 and 3rd International Workshop, SETOP, Athens, Greece, September 23, 2010, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIV, 259 p.) |
Disciplina | 005.74 |
Collana | Security and Cryptology |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computers and civilization Computer communication systems Operating systems (Computers) Application software Management of Computing and Information Systems Cryptology Computers and Society Computer Communication Networks Operating Systems Information Systems Applications (incl. Internet) |
ISBN | 3-642-19348-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465677503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 265 p. 50 illus.) |
Disciplina |
005.437
4.019 |
Collana | Security and Cryptology |
Soggetto topico |
User interfaces (Computer systems)
Computers Law and legislation Computers and civilization Computer security Data encryption (Computer science) Computer communication systems User Interfaces and Human Computer Interaction Legal Aspects of Computing Computers and Society Systems and Data Security Cryptology Computer Communication Networks |
ISBN |
1-280-38537-5
9786613563293 3-642-11207-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talks -- The UNESCO Chair in Data Privacy Research in Vehicular Networks -- Privacy Management for Global Organizations -- Data Privacy Management -- Obligation Language and Framework to Enable Privacy-Aware SOA -- Distributed Privacy-Preserving Methods for Statistical Disclosure Control -- Towards a Privacy-Preserving National Identity Card -- Using SAT-Solvers to Compute Inference-Proof Database Instances -- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem -- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search -- Visualizing Privacy Implications of Access Control Policies in Social Network Systems -- Contextual Privacy Management in Extended Role Based Access Control Model -- Autonomous and Spontaneous Security -- Dynamic Security Rules for Geo Data -- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking -- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) -- Untraceable Tags Based on Mild Assumptions -- Security Threat Mitigation Trends in Low-Cost RFID Systems -- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification -- DDoS Defense Mechanisms: A New Taxonomy -- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems -- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. |
Record Nr. | UNISA-996465332603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management and Autonomous Spontaneous Security [[electronic resource] ] : 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Yves Roudier |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 265 p. 50 illus.) |
Disciplina |
005.437
4.019 |
Collana | Security and Cryptology |
Soggetto topico |
User interfaces (Computer systems)
Computers Law and legislation Computers and civilization Computer security Data encryption (Computer science) Computer communication systems User Interfaces and Human Computer Interaction Legal Aspects of Computing Computers and Society Systems and Data Security Cryptology Computer Communication Networks |
ISBN |
1-280-38537-5
9786613563293 3-642-11207-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talks -- The UNESCO Chair in Data Privacy Research in Vehicular Networks -- Privacy Management for Global Organizations -- Data Privacy Management -- Obligation Language and Framework to Enable Privacy-Aware SOA -- Distributed Privacy-Preserving Methods for Statistical Disclosure Control -- Towards a Privacy-Preserving National Identity Card -- Using SAT-Solvers to Compute Inference-Proof Database Instances -- A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem -- A Spatial Cloaking Framework Based on Range Search for Nearest Neighbor Search -- Visualizing Privacy Implications of Access Control Policies in Social Network Systems -- Contextual Privacy Management in Extended Role Based Access Control Model -- Autonomous and Spontaneous Security -- Dynamic Security Rules for Geo Data -- Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking -- ASRBAC: A Security Administration Model for Mobile Autonomic Networks (MAutoNets) -- Untraceable Tags Based on Mild Assumptions -- Security Threat Mitigation Trends in Low-Cost RFID Systems -- An Effective TCP/IP Fingerprinting Technique Based on Strange Attractors Classification -- DDoS Defense Mechanisms: A New Taxonomy -- RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems -- Achieving Life-Cycle Compliance of Service-Oriented Architectures: Open Issues and Challenges. |
Record Nr. | UNINA-9910483479003321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Privacy Management and Autonomous Spontaneus Security [[electronic resource] ] : 6th International Workshop, DPM 2011 and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Nora Cuppens-Boulahia, Sabrina De Capitani di Vimercati |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XV, 319 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Computers and civilization Computer communication systems Operating systems (Computers) Application software Management of Computing and Information Systems Cryptology Computers and Society Computer Communication Networks Operating Systems Information Systems Applications (incl. Internet) |
ISBN | 3-642-28879-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Privacy Challenges in RFID / Gildas Avoine -- Fake Injection Strategies for Private Phonetic Matching / Alexandros Karakasidis, Vassilios S. Verykios and Peter Christen -- A Design Phase for Data Sharing Agreements / Ilaria Matteucci, Marinella Petrocchi, Marco Luca Sbodio and Luca Wiegand -- A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings / Javier Parra-Arnau, David Rebollo-Monedero and Jordi Forné -- On the Complexity of Aggregating Information for Authentication and Profiling / Christian A. Duncan and Vir V. Phoha -- Secure and Privacy-Aware Searching in Peer-to-Peer Networks / Jaydip Sen -- On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol / Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi and Hamid Behnam -- Inference-Proof View Update Transactions with Minimal Refusals / Joachim Biskup and Cornelia Tadros
Representation-Independent Data Usage Control / Alexander Pretschner, Enrico Lovat and Matthias Büchler -- Using Personal Portfolios to Manage Customer Data / Aimilia Tasidou and Pavlos S. Efraimidis -- Using Requirements Engineering in an Automatic Security Policy Derivation Process / Mariem Graa, Nora Cuppens-Boulahia, Fabien Autrel, Hanieh Azkia and Frédéric Cuppens, et al. -- Web Services Verification and Prudent Implementation / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki and Michaël Rusinowitch -- Evolving Security Requirements in Multi-layered Service-Oriented-Architectures / Muhammad Sabir Idrees, Gabriel Serme, Yves Roudier, Anderson Santana De Oliveira and Herve Grall, et al. -- Risk-Based Auto-delegation for Probabilistic Availability / Leanid Krautsevich, Fabio Martinelli, Charles Morisset and Artsiom Yautsiukhin -- Intra-role Progression in RBAC: An RPG-Like Access Control Scheme / Carles Martínez-García, Guillermo Navarro-Arribas and Joan Borrell -- Distributed Orchestration of Web Services under Security Constraints / Tigran Avanesov, Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch and Mathieu Turuani -- On the Key Schedule Strength of PRESENT / Julio Cesar Hernandez-Castro, Pedro Peris-Lopez and Jean-Philippe Aumasson -- A Traffic Regulation Method Based on MRA Signatures to Reduce Unwanted Traffic from Compromised End-User Machines / Enric Pujol-Gil and Nikolaos Chatzis -- Network Securing against Threatening Requests / Yulong Fu and Ousmane Kone -- A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring / Maria N. Koukovini, Eugenia I. Papagiannakopoulou, Georgios V. Lioudakis, Dimitra I. Kaklamani and Iakovos S. Venieris -- Controlling Data Dissemination / Helge Janicke, Mohamed Sarrab and Hamza Aldabbas -- A Framework of Deployment Strategy for Hierarchical WSN Security Management / Christine Hennebert and Vincent Berg. |
Record Nr. | UNISA-996466249203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management, and Security Assurance [[electronic resource] ] : 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 291 p. 68 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) |
ISBN | 3-319-29883-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Quantitative Aspects of Security Assurance -- Reputation, Monetization and Data Privacy Management -- Biometrics and Privacy Preservation -- Position Papers -- Short Papers. |
Record Nr. | UNISA-996466356203316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data Privacy Management, and Security Assurance [[electronic resource] ] : 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers / / edited by Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XV, 291 p. 68 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Management information systems Computer science Data encryption (Computer science) Application software Systems and Data Security Management of Computing and Information Systems Cryptology Information Systems Applications (incl. Internet) |
ISBN | 3-319-29883-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Quantitative Aspects of Security Assurance -- Reputation, Monetization and Data Privacy Management -- Biometrics and Privacy Preservation -- Position Papers -- Short Papers. |
Record Nr. | UNINA-9910483656603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data privacy management, cryptocurrencies and blockchain technology : ESORICS 2022 international workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, revised selected papers / / Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas and Nicola Dragoni, editors |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (333 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Data protection |
ISBN | 3-031-25734-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | DPM Workshop: Differential Privacy and Data Analysis -- Enhancing Privacy in Federated Learning with Local Differential Privacy for Email Classification -- Towards Measuring Fairness for Local Differential Privacy -- Privacy-Preserving Link Prediction -- DPM Workshop: Regulation, Artificial Intelligence, and Formal Verification -- An Email a Day Could Give Your Health Data Away -- Explanation of Black Box AI for GDPR related Privacy using Isabelle -- Secure Internet Exams Despite Coercion -- DPM Workshop: Leakage Quantification and Applications -- Privacy with Good Taste: A Case Study in Quantifying Privacy Risks in Genetic Scores -- A Parallel Privacy Preserving Shortest Path Protocol from a Path Algebra Problem -- A blockchain-based architecture to manage user privacy preferences on smart shared spaces privately -- No salvation from trackers: Privacy analysis of religious websites and mobile apps -- CBT Workshop: Bitcoin, Lightning Network and Scalability -- An empirical analysis of running a Bitcoin minimal wallet on an IoT device 160 -- The Ticket Price Matters in Sharding Blockchain -- On the Routing Convergence Delay in the Lightning Network -- LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains -- CBT Workshop: Anonymity, Fault Tolerance and Governance -- Preserving Buyer-Privacy in Decentralized Supply Chain Marketplaces -- Grape: Efficient Hybrid Consensus Protocol Using DAG -- A Game-Theoretic Analysis of Delegation Incentives in Blockchain Governance -- CBT Workshop: Short Papers -- A Limitlessly Scalable Transaction System -- Migrating Blockchains Away From ECDSA for Post-Quantum Security: A Study of Impact on Users and Applications -- Verifiable External Blockchain Calls: Towards Removing Oracle Input Intermediaries. |
Record Nr. | UNINA-9910674343903321 |
Cham, Switzerland : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|