.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNINA-9910626006403321 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
.. Annual International Conference on Privacy, Security and Trust |
Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
Disciplina | 004 |
Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
Soggetto genere / forma | Conference papers and proceedings. |
ISSN | 2643-4202 |
Formato | Materiale a stampa |
Livello bibliografico | Periodico |
Lingua di pubblicazione | eng |
Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
Record Nr. | UNISA-996581477403316 |
Piscataway, NJ : , : IEEE | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
CCTE : 10th Conference of Telecommunication, Media and Internet Techno-Economics : 16-18 May 2011 |
Pubbl/distr/stampa | New York : , : IEEE, , 2011 |
Descrizione fisica | 1 online resource (210 pages) |
Soggetto topico |
Mobile communication systems
Mobile computing Internet - Access control |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996279570503316 |
New York : , : IEEE, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
Pubbl/distr/stampa | Chichester, UK : , : Wiley, , 2008 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | HoltmannsSilke |
Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
ISBN |
0-470-77101-1
1-281-84103-X 9786611841034 0-470-77100-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
Record Nr. | UNINA-9910144112803321 |
Chichester, UK : , : Wiley, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
Pubbl/distr/stampa | Chichester, UK : , : Wiley, , 2008 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | HoltmannsSilke |
Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
ISBN |
0-470-77101-1
1-281-84103-X 9786611841034 0-470-77100-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
Record Nr. | UNINA-9910830993703321 |
Chichester, UK : , : Wiley, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
Pubbl/distr/stampa | Chichester, UK, : Wiley, 2008 |
Descrizione fisica | 1 online resource (218 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | HoltmannsSilke |
Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
ISBN |
0-470-77101-1
1-281-84103-X 9786611841034 0-470-77100-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
Record Nr. | UNINA-9910877619603321 |
Chichester, UK, : Wiley, 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
Autore | Stevens David (Lecturer in political theory) |
Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
Descrizione fisica | 1 online resource (316 p.) |
Disciplina | 303.5 |
Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
Soggetto genere / forma | Electronic books. |
ISBN | 0-19-061296-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
Record Nr. | UNINA-9910466158603321 |
Stevens David (Lecturer in political theory) | ||
New York, New York : , : Oxford University Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
Autore | Stevens David (Lecturer in political theory) |
Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
Descrizione fisica | 1 online resource (316 p.) |
Disciplina | 303.5 |
Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
ISBN | 0-19-061296-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
Record Nr. | UNINA-9910798192303321 |
Stevens David (Lecturer in political theory) | ||
New York, New York : , : Oxford University Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
Autore | Stevens David (Lecturer in political theory) |
Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
Descrizione fisica | 1 online resource (316 p.) |
Disciplina | 303.5 |
Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
ISBN | 0-19-061296-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
Record Nr. | UNINA-9910824035903321 |
Stevens David (Lecturer in political theory) | ||
New York, New York : , : Oxford University Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Digital privacy in the marketplace : perspectives on the information exchange / / George R. Milne |
Autore | Milne George R. |
Edizione | [First edition.] |
Pubbl/distr/stampa | New York, New York (222 East 46th Street, New York, NY 10017) : , : Business Expert Press, , 2015 |
Descrizione fisica | 1 online resource (200 p.) |
Disciplina | 004.678 |
Collana | Digital and social media marketing and advertising collection |
Soggetto topico |
Internet - Access control
Teleshopping Computer security Data protection |
Soggetto genere / forma | Electronic books. |
Soggetto non controllato |
Privacy
Information Exchange Technology Privacy Harms and Protections Future of Privacy |
ISBN | 1-60649-849-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. The information environment and the privacy problem -- 2. Why privacy is needed -- 3. Perspectives of privacy: technology history and academic theories -- 4. Information exchange and privacy in the marketplace -- 5. Information based privacy harms -- 6. Forms of protection -- 7. The future of privacy -- References -- Index. |
Record Nr. | UNINA-9910460646603321 |
Milne George R. | ||
New York, New York (222 East 46th Street, New York, NY 10017) : , : Business Expert Press, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|