Data and Applications Security and Privacy XXXIV [[electronic resource] ] : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (405 pages) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Application software Data encryption (Computer science) Computer networks - Security measures Artificial intelligence Systems and Data Security Information Systems Applications (incl. Internet) Cryptology Mobile and Network Security Artificial Intelligence |
ISBN | 3-030-49669-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies. |
Record Nr. | UNISA-996418302703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings / / edited by Anoop Singhal, Jaideep Vaidya |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (405 pages) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Computer security
Application software Data encryption (Computer science) Computer networks - Security measures Artificial intelligence Systems and Data Security Information Systems Applications (incl. Internet) Cryptology Mobile and Network Security Artificial Intelligence |
ISBN | 3-030-49669-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies. |
Record Nr. | UNINA-9910410054303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Network Security Metrics / / by Lingyu Wang, Sushil Jajodia, Anoop Singhal |
Autore | Wang Lingyu |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 207 p. 110 illus., 63 illus. in color.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Systems and Data Security Computer Communication Networks Cryptology |
ISBN | 3-319-66505-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks -- 2 Refining CVSS-based network security metrics by examining the base scores -- 3 Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs -- 4 k-Zero day safety: Evaluating the resilience of networks against unknown attacks -- 5 Using Bayesian Networks to Fuse Intrusion Evidences and Detect Zero-day Attack Paths -- 6 Evaluating the network diversity of networks against zero-day attacks -- 7 Metrics suite for network attack graph analytics -- 8 A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center. |
Record Nr. | UNINA-9910254849503321 |
Wang Lingyu | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Secure Cloud Computing / / edited by Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (351 p.) |
Disciplina |
004
004.6 004.6782 005.7 |
Soggetto topico |
Computer security
Application software Computer communication systems Computers Systems and Data Security Information Systems Applications (incl. Internet) Computer Communication Networks Information Systems and Communication Service |
ISBN | 1-4614-9278-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Key Management Issues and Challenges in Cloud Services -- Costs and Security in Clouds -- Hardware-enhanced Security for Cloud Computing -- Cloud Computing Security: What Changes with Software-Defined Networking? -- Proof of Isolation for Cloud Storage -- Selective and Fine-Grained Access to Data in the Cloud -- Enabling Collaborative Data Authorization Between Enterprise Clouds -- Making Query Execution Over Encrypted Data Practical -- Privacy-preserving Keyword Search over Encrypted Data in Cloud Computing -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Secure Mission-Centric Operations in Cloud Computing -- Computational Decoys for Cloud Security -- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing -- Software Cruising: A New Technology for Building Concurrent Software Monitor -- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems. |
Record Nr. | UNINA-9910298573503321 |
New York, NY : , : Springer New York : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|