top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data and Applications Security and Privacy XXXIV [[electronic resource] ] : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya
Data and Applications Security and Privacy XXXIV [[electronic resource] ] : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (405 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Application software
Data encryption (Computer science)
Computer networks - Security measures
Artificial intelligence
Systems and Data Security
Information Systems Applications (incl. Internet)
Cryptology
Mobile and Network Security
Artificial Intelligence
ISBN 3-030-49669-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
Record Nr. UNISA-996418302703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (405 pages)
Disciplina 005.8
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Computer security
Application software
Data encryption (Computer science)
Computer networks - Security measures
Artificial intelligence
Systems and Data Security
Information Systems Applications (incl. Internet)
Cryptology
Mobile and Network Security
Artificial Intelligence
ISBN 3-030-49669-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
Record Nr. UNINA-9910410054303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Network Security Metrics / / by Lingyu Wang, Sushil Jajodia, Anoop Singhal
Network Security Metrics / / by Lingyu Wang, Sushil Jajodia, Anoop Singhal
Autore Wang Lingyu
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIV, 207 p. 110 illus., 63 illus. in color.)
Disciplina 005.8
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
Systems and Data Security
Computer Communication Networks
Cryptology
ISBN 3-319-66505-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks -- 2 Refining CVSS-based network security metrics by examining the base scores -- 3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs -- 4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks -- 5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths -- 6 Evaluating the network diversity of networks against zero-day attacks -- 7 Metrics suite for network attack graph analytics -- 8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center.
Record Nr. UNINA-9910254849503321
Wang Lingyu  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang
Edizione [1st ed. 2014.]
Pubbl/distr/stampa New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (351 p.)
Disciplina 004
004.6
004.6782
005.7
Soggetto topico Computer security
Application software
Computer communication systems
Computers
Systems and Data Security
Information Systems Applications (incl. Internet)
Computer Communication Networks
Information Systems and Communication Service
ISBN 1-4614-9278-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.
Record Nr. UNINA-9910298573503321
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui