.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNINA-9910626006403321 |
Piscataway, NJ : , : IEEE | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNISA-996581477403316 |
Piscataway, NJ : , : IEEE | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014 |
Pubbl/distr/stampa | IEEE |
Soggetto topico |
Information technology - Management
Information technology - Security measures |
ISBN | 1-4799-4141-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2014 IT Professional Conference
IT Professional Conference |
Record Nr. | UNISA-996280396003316 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014 |
Pubbl/distr/stampa | IEEE |
Soggetto topico |
Information technology - Management
Information technology - Security measures |
ISBN | 1-4799-4141-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
2014 IT Professional Conference
IT Professional Conference |
Record Nr. | UNINA-9910135199503321 |
IEEE | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2020 |
Descrizione fisica | 1 online resource (iii, 249 pages) |
Collana | S. hrg. |
Soggetto topico |
Computer security - United States
Data protection - United States Computer security Data protection Information technology - Security measures |
Soggetto genere / forma |
Legislative hearings.
Rules. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | 2020 census |
Record Nr. | UNINA-9910712981503321 |
Washington : , : U.S. Government Publishing Office, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Access denied : keeping adversaries away from the Homeland Security supply chain : joint hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 12, 2018 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2019 |
Descrizione fisica | 1 online resource (iv, 39 pages) : color illustration |
Soggetto topico |
Cyberinfrastructure - Security measures - United States
Software protection - Government policy - United States Business logistics - United States Information technology - Security measures |
Soggetto genere / forma |
Online resources.
Legislative hearings. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Access denied |
Record Nr. | UNINA-9910711814003321 |
Washington : , : U.S. Government Publishing Office, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martínez-BallestéAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-76021-1
9786612760211 981-279-033-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Record Nr. | UNINA-9910456155703321 |
Hackensack, N.J., : World Scientific, c2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martínez-BallestéAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
ISBN | 9789812790330 (e-book) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Record Nr. | UNINA-9910780726503321 |
Hackensack, N.J., : World Scientific, c2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martínez-Ballesté |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2010 |
Descrizione fisica | 1 online resource (402 p.) |
Disciplina | 005.8/6 |
Altri autori (Persone) |
SolanasAgusti
Martínez-BallestéAntoni |
Collana | Intelligent information systems |
Soggetto topico |
Information technology - Security measures
Computer security Data protection Artificial intelligence |
ISBN | 9789812790330 (e-book) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms 3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates 3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing 4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks 5.2.4.1. The backpropagation algorithm |
Record Nr. | UNINA-9910824069403321 |
Hackensack, N.J., : World Scientific, c2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
AINS : 2017 IEEE Conference on Applications, Information and Network Security : 13th-14th November 2017, Miri Marriott Resort & Spa, Miri, Sarawak, Malaysia |
Pubbl/distr/stampa | New York : , : IEEE, , 2018 |
Descrizione fisica | 1 online resource (227 pages) |
Soggetto topico |
Computer networks - Security measures
Information technology - Security measures |
ISBN | 1-5386-0725-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910255439603321 |
New York : , : IEEE, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|