top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Global digital data governance : Polycentric perspectives. / / Carolina Aguerre
Global digital data governance : Polycentric perspectives. / / Carolina Aguerre
Autore Aguerre Carolina
Descrizione fisica 1 online resource
Disciplina 303.48/34
Collana Routledge Global Cooperation Series.
Soggetto topico Data protection - International cooperation
Data protection - Government policy
ISBN 1-003-85976-3
1-003-38841-8
Classificazione COM060000COM060040POL040020
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction : polycentric perspectives on digital data governance / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte -- Nudging the Ostroms' vision of the commons on polycentric governance into the digital environment / Anjanette H. Raymond and Scott Shackelford -- Internet interoperability and polycentric attributes in global digital data ordering / Carolina Aguerre -- The challenges of governance in a datascape : theorizing the role of non-extractive methodologies in the 2030 agenda / Isabel Rocha de Siqueira and Laís Ramalho -- Grassroots data activism and polycentric governance : perspectives from the margins / Daivi Rodima Taylor -- Questions as a device for data responsibility : making data science responsible by formulating questions in a polycentric way / Stefaan Verhulst -- Decentralized but coordinated : probing polycentricity in EU data protection crossborder enforcement / Wenlong Li and Dan Yang -- Trade agreements and cross-border disinformation : patchwork or polycentric? / Susan A. Aaronson -- Trackers and chased : governance challenges in disinformation datafication / Clara Iglesias Keller and Bruna Martins dos Santos -- Privacy governance from a polycentric perspective / Dmitry Epstein and Rotem Medzini -- Global data governance by internet interconnection / Nathalia Sautchuk Patrício -- The distributions of distributed governance : power, instability and complexity in polycentric data ordering / Malcolm Campbell-Verduyn -- Polycentric theory diffusion and AI governance / Janet Hui Xue -- Conclusion : the end of a beginning / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte.
Record Nr. UNINA-9910773615103321
Aguerre Carolina  
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
I-ways
I-ways
Pubbl/distr/stampa [Amsterdam], : IOS Press
Disciplina 384
Soggetto topico Data protection - International cooperation
Computer networks - International cooperation
Electronic data processing - Government policy
Computers - Access control - International cooperation
Data protection
Computer networks
Computers - Access control
Computer Communication Networks
Protection de l'information (Informatique)
Réseaux d'ordinateurs
Informatique - Politique gouvernementale
Ordinateurs - Accès - Contrôle
Protection de l'information (Informatique) - Coopération internationale
Réseaux d'ordinateurs - Coopération internationale
Ordinateurs - Accès - Contrôle - Coopération internationale
Information Technology
Soggetto genere / forma Periodicals.
ISSN 1875-8886
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNISA-996199373603316
[Amsterdam], : IOS Press
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
I-ways
I-ways
Pubbl/distr/stampa [Amsterdam], : IOS Press
Disciplina 384
Soggetto topico Data protection - International cooperation
Computer networks - International cooperation
Electronic data processing - Government policy
Computers - Access control - International cooperation
Data protection
Computer networks
Computers - Access control
Computer Communication Networks
Protection de l'information (Informatique)
Réseaux d'ordinateurs
Informatique - Politique gouvernementale
Ordinateurs - Accès - Contrôle
Protection de l'information (Informatique) - Coopération internationale
Réseaux d'ordinateurs - Coopération internationale
Ordinateurs - Accès - Contrôle - Coopération internationale
Information Technology
Soggetto genere / forma Periodicals.
ISSN 1875-8886
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Record Nr. UNINA-9910339537703321
[Amsterdam], : IOS Press
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.)
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Descrizione fisica 1 online resource (XIII, 386 p.)
Disciplina 005.8
Altri autori (Persone) YoumHeung Youl
YungMoti
Collana Lecture notes in computer science
Soggetto topico Computer security - International cooperation
Data protection - International cooperation
ISBN 1-280-38536-7
9786613563286
3-642-10838-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Record Nr. UNINA-9910483065303321
Berlin ; ; Heidelberg, : Springer-Verlag, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers / / Jooseok Song, Taekyoung Kwon, Moti Yung (eds.)
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers / / Jooseok Song, Taekyoung Kwon, Moti Yung (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (XII, 378 p.)
Disciplina 005.8
Altri autori (Persone) SongJooSeok
KwonTaekyoung
YungMoti
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security - International cooperation
Data protection - International cooperation
ISBN 3-540-33153-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.’s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES Software Implementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers.
Altri titoli varianti WISA 2005
Record Nr. UNINA-9910484509403321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.)
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, 2005
Descrizione fisica 1 online resource (XII, 472 p.)
Disciplina 005.8
Altri autori (Persone) LimChae Hoon
YungMoti
Collana Lecture notes in computer science
Soggetto topico Computer security - International cooperation
Data protection - International cooperation
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts.
Altri titoli varianti WISA 2004
Record Nr. UNINA-9910484261803321
Berlin ; ; New York, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of e-governance
Journal of e-governance
Pubbl/distr/stampa Amsterdam, Netherlands, : IOS Press
Descrizione fisica 1 online resource
Soggetto topico Data protection - International cooperation
Computer networks - International cooperation
Electronic data processing - Government policy
Computers - Access control - International cooperation
Internet in public administration - Law and legislation
Soggetto genere / forma Periodicals.
Soggetto non controllato Computer Science
ISSN 1878-7681
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Journal of electronic-governance
Record Nr. UNINA-9910339758403321
Amsterdam, Netherlands, : IOS Press
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of e-governance
Journal of e-governance
Pubbl/distr/stampa Amsterdam, Netherlands, : IOS Press
Descrizione fisica 1 online resource
Soggetto topico Data protection - International cooperation
Computer networks - International cooperation
Electronic data processing - Government policy
Computers - Access control - International cooperation
Internet in public administration - Law and legislation
Soggetto genere / forma Periodicals.
Soggetto non controllato Computer Science
ISSN 1878-7681
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Journal of electronic-governance
Record Nr. UNISA-996210247303316
Amsterdam, Netherlands, : IOS Press
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui