top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
.. Annual International Conference on Privacy, Security and Trust
.. Annual International Conference on Privacy, Security and Trust
Pubbl/distr/stampa Piscataway, NJ : , : IEEE
Disciplina 004
Soggetto topico Information technology - Security measures
Internet - Access control
Privacy, Right of
Data protection
Computers - Access control
Electronic commerce - Security measures
Soggetto genere / forma Conference papers and proceedings.
ISSN 2643-4202
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti PST
Privacy, Security and Trust, PST, Annual Conference on
Record Nr. UNINA-9910626006403321
Piscataway, NJ : , : IEEE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
.. Annual International Conference on Privacy, Security and Trust
.. Annual International Conference on Privacy, Security and Trust
Pubbl/distr/stampa Piscataway, NJ : , : IEEE
Disciplina 004
Soggetto topico Information technology - Security measures
Internet - Access control
Privacy, Right of
Data protection
Computers - Access control
Electronic commerce - Security measures
Soggetto genere / forma Conference papers and proceedings.
ISSN 2643-4202
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti PST
Privacy, Security and Trust, PST, Annual Conference on
Record Nr. UNISA-996581477403316
Piscataway, NJ : , : IEEE
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014
Pubbl/distr/stampa IEEE
Soggetto topico Information technology - Management
Information technology - Security measures
ISBN 1-4799-4141-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2014 IT Professional Conference
IT Professional Conference
Record Nr. UNISA-996280396003316
IEEE
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014
2014 IT Professional Conference (IT Pro 2014) : Gaithersburg, Maryland, USA 22 May 2014
Pubbl/distr/stampa IEEE
Soggetto topico Information technology - Management
Information technology - Security measures
ISBN 1-4799-4141-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2014 IT Professional Conference
IT Professional Conference
Record Nr. UNINA-9910135199503321
IEEE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
2020 census : conducting a secure and accurate count : hearing before the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Sixteenth Congress, first session, July 16, 2019
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2020
Descrizione fisica 1 online resource (iii, 249 pages)
Collana S. hrg.
Soggetto topico Computer security - United States
Data protection - United States
Computer security
Data protection
Information technology - Security measures
Soggetto genere / forma Legislative hearings.
Rules.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti 2020 census
Record Nr. UNINA-9910712981503321
Washington : , : U.S. Government Publishing Office, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Access denied : keeping adversaries away from the Homeland Security supply chain : joint hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 12, 2018
Access denied : keeping adversaries away from the Homeland Security supply chain : joint hearing before the Subcommittee on Counterterrorism and Intelligence and the Subcommittee on Oversight and Management Efficiency of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 12, 2018
Pubbl/distr/stampa Washington : , : U.S. Government Publishing Office, , 2019
Descrizione fisica 1 online resource (iv, 39 pages) : color illustration
Soggetto topico Cyberinfrastructure - Security measures - United States
Software protection - Government policy - United States
Business logistics - United States
Information technology - Security measures
Soggetto genere / forma Online resources.
Legislative hearings.
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Access denied
Record Nr. UNINA-9910711814003321
Washington : , : U.S. Government Publishing Office, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
Soggetto genere / forma Electronic books.
ISBN 1-282-76021-1
9786612760211
981-279-033-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910456155703321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security [[electronic resource] /] / editors, Agusti Solanas, Antoni Martínez-Ballesté
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
ISBN 9789812790330 (e-book)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910780726503321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martínez-Ballesté
Advances in artificial intelligence for privacy protection and security / / editors, Agusti Solanas, Antoni Martínez-Ballesté
Edizione [1st ed.]
Pubbl/distr/stampa Hackensack, N.J., : World Scientific, c2010
Descrizione fisica 1 online resource (402 p.)
Disciplina 005.8/6
Altri autori (Persone) SolanasAgusti
Martínez-BallestéAntoni
Collana Intelligent information systems
Soggetto topico Information technology - Security measures
Computer security
Data protection
Artificial intelligence
ISBN 9789812790330 (e-book)
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents; Preface; 1. Introduction A. Solanas and A. Martnez-Balleste; 1.1. Organization of the book; References; PART 1: A Brief Introduction to Privacy and Security; 2. An Introduction to Privacy Aspects of Information and Communication Technologies A. Martinez-Balleste and A. Solanas; Contents; 2.1. Introduction; 2.2. Privacy and the Internet; 2.2.1. Monitoring User Activity; 2.2.1.1. Tracking Cookies; 2.2.1.2. Spyware; 2.2.1.3. Social Engineering Attacks; 2.2.2. Privacy in Modern Web Services; 2.2.2.1. Privacy in Social Networks; 2.2.2.2. Privacy in E-Commerce
2.2.3. The Big Brothers of Internet 2.3. Privacy in Databases; 2.3.1. Privacy of the Respondents; 2.3.2. User Privacy; 2.4. Privacy in Ubiquitous Computing; 2.4.1. Location-Based Services; 2.4.1.1. TTP-Based Schemes; 2.4.1.2. TTP-Free Proposals; 2.4.2. Radio-Frequency Identific̄ation; 2.5. Conclusions; Disclaimer and Acknowledgements; References; 3. An Overview of Information Security A. Ribagorda Garnacho, A. I. Gonzalez-Tablas Ferreres, A. Alcaide Raya; Contents; 3.1. Introduction; 3.2. Vulnerabilities; 3.3. Threats; 3.4. Countermeasures; 3.5. Authentication mechanisms
3.5.1. Something you know 3.5.2. Something you are; 3.5.3. Something you have; 3.6. Access control mechanisms; 3.6.1. Access control policies; 3.6.2. Access control models; 3.6.2.1. Access matrix model; 3.6.2.2. Mandatory access control models; 3.7. Data encipherment mechanisms; 3.7.1. Attacks; 3.7.2. Cryptosystems classification; 3.7.2.1. Substitution, transposition and product ciphers; 3.7.2.2. Symmetric or secret key cryptosystems; 3.7.2.3. Asymmetric or public key cryptosystems; 3.7.3. Stream and block cryptosystems; 3.8. Digital signature mechanism; 3.9. Digital certificates
3.10. Audit logs 3.11. Physical security; 3.11.1. Intrusion prevention; 3.11.2. Electromagnetic emanations; 3.11.3. Physical access control systems; References; PART 2: Privacy Protection by means of Artificial Intelligence; 4. Data Mining in Large Databases | Strategies for Managing the Trade-O® Between Societal Benet̄ and Individual Privacy M. Schmid; Contents; 4.1. Introduction; 4.2. Examples of data-collecting institutions and data users; 4.3. Strategies for controlling privacy; 4.3.1. Input control and masked data sets; 4.3.2. Output control; 4.3.3. Query auditing
4.3.5. Measuring privacy and disclosure risk in published outputs 4.4. Measures of the utility of published data sets and outputs; 4.5. Conclusion; References; 5. Desemantization for Numerical Microdata Anonymization J. Pont-Tuset, J. Nin, P. Medrano-Gracia, J.-Ll. Larriba-Pey and V. Muntes-Mulero; Contents; 5.1. Introduction; 5.2. Background and State of the Art; 5.2.1. Microdata protection scenario; 5.2.2. Information loss and disclosure risk; 5.2.3. State of the art in microdata anonymization methods; 5.2.3.1. Rank swapping; 5.2.3.2. Microaggregation; 5.2.4. Artificial neural networks
5.2.4.1. The backpropagation algorithm
Record Nr. UNINA-9910824069403321
Hackensack, N.J., : World Scientific, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
AINS : 2017 IEEE Conference on Applications, Information and Network Security : 13th-14th November 2017, Miri Marriott Resort & Spa, Miri, Sarawak, Malaysia
AINS : 2017 IEEE Conference on Applications, Information and Network Security : 13th-14th November 2017, Miri Marriott Resort & Spa, Miri, Sarawak, Malaysia
Pubbl/distr/stampa New York : , : IEEE, , 2018
Descrizione fisica 1 online resource (227 pages)
Soggetto topico Computer networks - Security measures
Information technology - Security measures
ISBN 1-5386-0725-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910255439603321
New York : , : IEEE, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui