Proceedings of the First International Workshop on technical and legal aspects of data privacy / / Ilaria Matteucci, Paolo Mori, Marinella Petrocchi ; Association for Computing Machinery-Digital Library |
Autore | Matteucci Ilaria |
Pubbl/distr/stampa | Piscataway, New Jersey : , : IEEE Press, , 2015 |
Descrizione fisica | 1 online resource (71 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Data encryption (Computer science) Data protection |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910376468603321 |
Matteucci Ilaria | ||
Piscataway, New Jersey : , : IEEE Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 139 p. 80 illus., 13 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 3-030-59817-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting |Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining. |
Record Nr. | UNINA-9910427714103321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 139 p. 80 illus., 13 illus. in color.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer security
Computer networks - Security measures |
ISBN | 3-030-59817-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting |Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining. |
Record Nr. | UNISA-996418307603316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management [[electronic resource] ] : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 321 p. 74 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology Computer Science, general |
ISBN | 3-642-38004-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Policy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access Control -- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities -- Labeled Goal-Directed Search in Access Control Logic -- A Use-Based Approach for Enhancing UCON -- Analysis of Communicating Authorization Policies -- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy -- Distributed Systems and Physical Security -- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification -- DOT-COM: Decentralized Online Trading and COMmerce -- Formalizing Physical Security Procedures -- Authentication -- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items -- Authenticating Email Search Results -- Software Authentication to Enhance Trust in Body Sensor Networks -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM -- Security Policies -- Boosting Model Checking to Analyse Large ARBAC Policies -- Constrained Role Mining -- A Datalog Semantics for Paralocks. |
Record Nr. | UNISA-996466196303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 321 p. 74 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Management information systems Computer science Data encryption (Computer science) Systems and Data Security Management of Computing and Information Systems Cryptology Computer Science, general |
ISBN | 3-642-38004-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Policy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access Control -- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities -- Labeled Goal-Directed Search in Access Control Logic -- A Use-Based Approach for Enhancing UCON -- Analysis of Communicating Authorization Policies -- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy -- Distributed Systems and Physical Security -- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification -- DOT-COM: Decentralized Online Trading and COMmerce -- Formalizing Physical Security Procedures -- Authentication -- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items -- Authenticating Email Search Results -- Software Authentication to Enhance Trust in Body Sensor Networks -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM -- Security Policies -- Boosting Model Checking to Analyse Large ARBAC Policies -- Constrained Role Mining -- A Datalog Semantics for Paralocks. |
Record Nr. | UNINA-9910741159103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|