Global digital data governance : Polycentric perspectives. / / Carolina Aguerre |
Autore | Aguerre Carolina |
Descrizione fisica | 1 online resource |
Disciplina | 303.48/34 |
Collana | Routledge Global Cooperation Series. |
Soggetto topico |
Data protection - International cooperation
Data protection - Government policy |
ISBN |
1-003-85976-3
1-003-38841-8 |
Classificazione | COM060000COM060040POL040020 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction : polycentric perspectives on digital data governance / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte -- Nudging the Ostroms' vision of the commons on polycentric governance into the digital environment / Anjanette H. Raymond and Scott Shackelford -- Internet interoperability and polycentric attributes in global digital data ordering / Carolina Aguerre -- The challenges of governance in a datascape : theorizing the role of non-extractive methodologies in the 2030 agenda / Isabel Rocha de Siqueira and Laís Ramalho -- Grassroots data activism and polycentric governance : perspectives from the margins / Daivi Rodima Taylor -- Questions as a device for data responsibility : making data science responsible by formulating questions in a polycentric way / Stefaan Verhulst -- Decentralized but coordinated : probing polycentricity in EU data protection crossborder enforcement / Wenlong Li and Dan Yang -- Trade agreements and cross-border disinformation : patchwork or polycentric? / Susan A. Aaronson -- Trackers and chased : governance challenges in disinformation datafication / Clara Iglesias Keller and Bruna Martins dos Santos -- Privacy governance from a polycentric perspective / Dmitry Epstein and Rotem Medzini -- Global data governance by internet interconnection / Nathalia Sautchuk Patrício -- The distributions of distributed governance : power, instability and complexity in polycentric data ordering / Malcolm Campbell-Verduyn -- Polycentric theory diffusion and AI governance / Janet Hui Xue -- Conclusion : the end of a beginning / Carolina Aguerre, Malcolm Campbell-Verduyn and Jan Aart Scholte. |
Record Nr. | UNINA-9910773615103321 |
Aguerre Carolina | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
I-ways |
Pubbl/distr/stampa | [Amsterdam], : IOS Press |
Disciplina | 384 |
Soggetto topico |
Data protection - International cooperation
Computer networks - International cooperation Electronic data processing - Government policy Computers - Access control - International cooperation Data protection Computer networks Computers - Access control Computer Communication Networks Protection de l'information (Informatique) Réseaux d'ordinateurs Informatique - Politique gouvernementale Ordinateurs - Accès - Contrôle Protection de l'information (Informatique) - Coopération internationale Réseaux d'ordinateurs - Coopération internationale Ordinateurs - Accès - Contrôle - Coopération internationale Information Technology |
Soggetto genere / forma | Periodicals. |
ISSN | 1875-8886 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996199373603316 |
[Amsterdam], : IOS Press | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
I-ways |
Pubbl/distr/stampa | [Amsterdam], : IOS Press |
Disciplina | 384 |
Soggetto topico |
Data protection - International cooperation
Computer networks - International cooperation Electronic data processing - Government policy Computers - Access control - International cooperation Data protection Computer networks Computers - Access control Computer Communication Networks Protection de l'information (Informatique) Réseaux d'ordinateurs Informatique - Politique gouvernementale Ordinateurs - Accès - Contrôle Protection de l'information (Informatique) - Coopération internationale Réseaux d'ordinateurs - Coopération internationale Ordinateurs - Accès - Contrôle - Coopération internationale Information Technology |
Soggetto genere / forma | Periodicals. |
ISSN | 1875-8886 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910339537703321 |
[Amsterdam], : IOS Press | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security applications : 10th international workshop, WISA 2009, Busan, Korea, August 25-27, 2009 : revised selected papers / / Heung Youl Youm, Moti Yung (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer-Verlag, 2009 |
Descrizione fisica | 1 online resource (XIII, 386 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
YoumHeung Youl
YungMoti |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
ISBN |
1-280-38536-7
9786613563286 3-642-10838-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multimedia Security -- Protecting IPTV Service Network against Malicious Rendezvous Point -- Design and Implementation of SIP-aware Security Management System -- Device Security -- Application Management Framework in User Centric Smart Card Ownership Model -- When Compromised Readers Meet RFID -- HW Implementation Security -- Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? -- Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules -- EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment -- Applied Cryptography -- Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles -- Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity -- Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy -- ID-Based Adaptive Oblivious Transfer -- Side Channel Attacks -- Unknown Plaintext Template Attacks -- On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices -- You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study of Mutual Information Analysis under a Gaussian Assumption -- Cryptograptanalysis -- Finding Collisions for a 45-Step Simplified HAS-V -- Non-linear Error Detection for Finite State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure -- Anonymity/Authentication/Access Control -- Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET -- A Selectable k-Times Relaxed Anonymous Authentication Scheme -- PUF-Based Authentication Protocols – Revisited -- Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application -- Network Security -- Securing Remote Access Inside Wireless Mesh Networks -- Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers -- USN Middleware Security Model -- Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. |
Record Nr. | UNINA-9910483065303321 |
Berlin ; ; Heidelberg, : Springer-Verlag, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers / / Jooseok Song, Taekyoung Kwon, Moti Yung (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2006 |
Descrizione fisica | 1 online resource (XII, 378 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
SongJooSeok
KwonTaekyoung YungMoti |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
ISBN | 3-540-33153-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security Analysis and Attacks -- Security Weakness in Ren et al.’s Group Key Agreement Scheme Built on Secure Two-Party Protocols -- Cryptanalysis of Some Group-Oriented Proxy Signature Schemes -- Application of LFSRs in Time/Memory Trade-Off Cryptanalysis -- System Security -- An Alert Data Mining Framework for Network-Based Intrusion Detection System -- Key Factors Influencing Worm Infection in Enterprise Networks -- Evaluation of the Unified Modeling Language for Security Requirements Analysis -- Network Security -- A Simple and Efficient Conference Scheme for Mobile Communications -- A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network -- Efficient Multicast Stream Authentication for the Fully Adversarial Network Model -- Elastic Security QoS Provisioning for Telematics Applications -- DRM/Software Security -- An Improved Algorithm to Watermark Numeric Relational Data -- Video Fingerprinting System Using Wavelet and Error Correcting Code -- Secure Asymmetric Watermark Detection Without Secret of Modified Pixels -- Kimchi: A Binary Rewriting Defense Against Format String Attacks -- Software Protection Through Dynamic Code Mutation -- Efficient HW Implementation -- Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m ) -- Developing and Implementing IHPM on IXP 425 Network Processor Platforms -- Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices -- mCrypton – A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors -- Side-Channel Attacks -- Practical Modifications of Leadbitter et al.’s Repeated-Bits Side-Channel Analysis on (EC)DSA -- A DPA Countermeasure by Randomized Frobenius Decomposition -- DPA Attack on the Improved Ha-Moon Algorithm -- An Efficient Masking Scheme for AES Software Implementations -- Privacy/Anonymity -- Secure Multi-attribute Procurement Auction -- Oblivious Conjunctive Keyword Search -- Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption -- Efficient Implementation -- New Concept of Authority Range for Flexible Management of Role Hierarchy -- Role-Based Access Control Model for Ubiquitous Computing Environment -- Designing Security Auditing Protocol with Web Browsers. |
Altri titoli varianti | WISA 2005 |
Record Nr. | UNINA-9910484509403321 |
Berlin ; ; New York, : Springer, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security applications : 5th international workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers / / Chae Hoon Lim, Moti Yung (eds.) |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, 2005 |
Descrizione fisica | 1 online resource (XII, 472 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
LimChae Hoon
YungMoti |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security - International cooperation
Data protection - International cooperation |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption – Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts. |
Altri titoli varianti | WISA 2004 |
Record Nr. | UNINA-9910484261803321 |
Berlin ; ; New York, : Springer, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Journal of e-governance |
Pubbl/distr/stampa | Amsterdam, Netherlands, : IOS Press |
Descrizione fisica | 1 online resource |
Soggetto topico |
Data protection - International cooperation
Computer networks - International cooperation Electronic data processing - Government policy Computers - Access control - International cooperation Internet in public administration - Law and legislation |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1878-7681 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Journal of electronic-governance |
Record Nr. | UNINA-9910339758403321 |
Amsterdam, Netherlands, : IOS Press | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Journal of e-governance |
Pubbl/distr/stampa | Amsterdam, Netherlands, : IOS Press |
Descrizione fisica | 1 online resource |
Soggetto topico |
Data protection - International cooperation
Computer networks - International cooperation Electronic data processing - Government policy Computers - Access control - International cooperation Internet in public administration - Law and legislation |
Soggetto genere / forma | Periodicals. |
Soggetto non controllato | Computer Science |
ISSN | 1878-7681 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti | Journal of electronic-governance |
Record Nr. | UNISA-996210247303316 |
Amsterdam, Netherlands, : IOS Press | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|