top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of the First International Workshop on technical and legal aspects of data privacy / / Ilaria Matteucci, Paolo Mori, Marinella Petrocchi ; Association for Computing Machinery-Digital Library
Proceedings of the First International Workshop on technical and legal aspects of data privacy / / Ilaria Matteucci, Paolo Mori, Marinella Petrocchi ; Association for Computing Machinery-Digital Library
Autore Matteucci Ilaria
Pubbl/distr/stampa Piscataway, New Jersey : , : IEEE Press, , 2015
Descrizione fisica 1 online resource (71 pages)
Disciplina 005.8
Soggetto topico Computer security
Data encryption (Computer science)
Data protection
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910376468603321
Matteucci Ilaria  
Piscataway, New Jersey : , : IEEE Press, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors)
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (IX, 139 p. 80 illus., 13 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computer networks - Security measures
ISBN 3-030-59817-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting |Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining.
Record Nr. UNINA-9910427714103321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors)
Security and trust management : 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, proceedings / / Kostantinos Markantonakis, Marinella Petrocchi (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (IX, 139 p. 80 illus., 13 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computer networks - Security measures
ISBN 3-030-59817-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Properties and Attacks -- Modelling and Analysis of 802.11 4-Way Handshake Attacks and Security Properties -- Reducing the Forensic Footprint with Android Accessibility Attacks -- A Novel Machine Learning Methodology for Detecting |Phishing Attacks in Real Time -- Confidentiality Schema -- Revocable access to encrypted message boards -- Establishing Secure Communication Channels Using Remote Attestation With TPM 2.0 -- Security Processes -- Improved Feature Engineering for Free-Text Keystroke Dynamics -- Subversion-Resistant Commitment Schemes: Definitions and Constructions -- Challenges in IT Security Processes and Solution Approaches with Process Mining.
Record Nr. UNISA-996418307603316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Security and Trust Management [[electronic resource] ] : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 321 p. 74 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Seguridad informática
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Computer Science, general
ISBN 3-642-38004-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Policy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access Control -- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities -- Labeled Goal-Directed Search in Access Control Logic -- A Use-Based Approach for Enhancing UCON -- Analysis of Communicating Authorization Policies -- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy -- Distributed Systems and Physical Security -- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification -- DOT-COM: Decentralized Online Trading and COMmerce -- Formalizing Physical Security Procedures -- Authentication -- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items -- Authenticating Email Search Results -- Software Authentication to Enhance Trust in Body Sensor Networks -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM -- Security Policies -- Boosting Model Checking to Analyse Large ARBAC Policies -- Constrained Role Mining -- A Datalog Semantics for Paralocks.
Record Nr. UNISA-996466196303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 321 p. 74 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Seguridad informática
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Computer Science, general
ISBN 3-642-38004-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Policy Enforcement and Monitoring -- Cost-Aware Runtime Enforcement of Security Policies -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors -- Lazy Security Controllers -- Access Control -- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities -- Labeled Goal-Directed Search in Access Control Logic -- A Use-Based Approach for Enhancing UCON -- Analysis of Communicating Authorization Policies -- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy -- Distributed Systems and Physical Security -- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification -- DOT-COM: Decentralized Online Trading and COMmerce -- Formalizing Physical Security Procedures -- Authentication -- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items -- Authenticating Email Search Results -- Software Authentication to Enhance Trust in Body Sensor Networks -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM -- Security Policies -- Boosting Model Checking to Analyse Large ARBAC Policies -- Constrained Role Mining -- A Datalog Semantics for Paralocks.
Record Nr. UNINA-9910741159103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui