.. Annual International Conference on Privacy, Security and Trust
| .. Annual International Conference on Privacy, Security and Trust |
| Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
| Disciplina | 004 |
| Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
| Soggetto genere / forma | Conference papers and proceedings. |
| ISSN | 2643-4202 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
| Record Nr. | UNINA-9910626006403321 |
| Piscataway, NJ : , : IEEE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
.. Annual International Conference on Privacy, Security and Trust
| .. Annual International Conference on Privacy, Security and Trust |
| Pubbl/distr/stampa | Piscataway, NJ : , : IEEE |
| Disciplina | 004 |
| Soggetto topico |
Information technology - Security measures
Internet - Access control Privacy, Right of Data protection Computers - Access control Electronic commerce - Security measures |
| Soggetto genere / forma | Conference papers and proceedings. |
| ISSN | 2643-4202 |
| Formato | Materiale a stampa |
| Livello bibliografico | Periodico |
| Lingua di pubblicazione | eng |
| Altri titoli varianti |
PST
Privacy, Security and Trust, PST, Annual Conference on |
| Record Nr. | UNISA-996581477403316 |
| Piscataway, NJ : , : IEEE | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
CCTE : 10th Conference of Telecommunication, Media and Internet Techno-Economics : 16-18 May 2011
| CCTE : 10th Conference of Telecommunication, Media and Internet Techno-Economics : 16-18 May 2011 |
| Pubbl/distr/stampa | New York : , : IEEE, , 2011 |
| Descrizione fisica | 1 online resource (210 pages) |
| Soggetto topico |
Mobile communication systems
Mobile computing Internet - Access control |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996279570503316 |
| New York : , : IEEE, , 2011 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.]
| Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
| Pubbl/distr/stampa | Chichester, UK : , : Wiley, , 2008 |
| Descrizione fisica | 1 online resource (218 p.) |
| Disciplina |
005.8
621.384 |
| Altri autori (Persone) | HoltmannsSilke |
| Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
| ISBN |
0-470-77101-1
1-281-84103-X 9786611841034 0-470-77100-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
| Record Nr. | UNINA-9910144112803321 |
| Chichester, UK : , : Wiley, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.]
| Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
| Pubbl/distr/stampa | Chichester, UK : , : Wiley, , 2008 |
| Descrizione fisica | 1 online resource (218 p.) |
| Disciplina |
005.8
621.384 |
| Altri autori (Persone) | HoltmannsSilke |
| Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
| ISBN |
0-470-77101-1
1-281-84103-X 9786611841034 0-470-77100-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
| Record Nr. | UNINA-9910830993703321 |
| Chichester, UK : , : Wiley, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.]
| Cellular authentication for mobile and Internet services / / Silke Holtmanns ... [et al.] |
| Pubbl/distr/stampa | Chichester, UK, : Wiley, 2008 |
| Descrizione fisica | 1 online resource (218 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | HoltmannsSilke |
| Soggetto topico |
Mobile communication systems - Access control
Internet - Access control Cell phone systems - Access control Wireless LANs - Access control Authentication |
| ISBN |
9786611841034
9780470771013 0470771011 9781281841032 128184103X 9780470771006 0470771003 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface. -- Acknowledgements. -- 1. Introduction. -- 1.1. Authenticated Key Agreement. -- 1..1. The Challenge in Authenticated Key Agreement. -- 1.3. How to read This Book? -- 2. Classical Approaches to Authentication and Key Agreement. -- 2.1. Existing Mobile Security Solutions. -- 2.2. General-Purpose Approaches to Authentication and Key Management. -- 2.3. Requirements for GAA. -- 3. Generic Authentication Architecture. -- 3.1. Overview of Generic Authentication Architecture. -- 3.2. Foundations of GAA. -- 3.3. Variations of the Generic Bootstrapping Architecture. -- 3.4. Building Blocks of GAA. -- 3.5. Other Architectural Issues. -- 3.6. Overview of 3GPP GAA Specifications. -- 4. Applications Using Generic Authentication Architecture. -- 4.1. Standardized Usage Scenarios. -- 4.2. Additional Usage Scenarios. -- 5. Guidance for Deploying GAA. -- 5.1. Integration with Application Servers. -- 5.2. Integration with OS Security. -- 5.3. Integration with Identity Management Systems. -- 5.4. Integration of GAA into Mobile Networks. -- 6. Future Trends. -- 6.1. Standardization Outlook. -- 6.2. Outlook for GAA. -- Terminology and Abbreviations. -- Index. |
| Record Nr. | UNINA-9911020163403321 |
| Chichester, UK, : Wiley, 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara
| The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
| Autore | Stevens David (Lecturer in political theory) |
| Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
| Descrizione fisica | 1 online resource (316 p.) |
| Disciplina | 303.5 |
| Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-19-061296-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
| Record Nr. | UNINA-9910466158603321 |
Stevens David (Lecturer in political theory)
|
||
| New York, New York : , : Oxford University Press, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara
| The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
| Autore | Stevens David (Lecturer in political theory) |
| Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
| Descrizione fisica | 1 online resource (316 p.) |
| Disciplina | 303.5 |
| Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
| ISBN | 0-19-061296-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
| Record Nr. | UNINA-9910798192303321 |
Stevens David (Lecturer in political theory)
|
||
| New York, New York : , : Oxford University Press, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara
| The devil's long tail : religious and other radicals in the internet marketplace / / David Stevens and Keiron O'Hara |
| Autore | Stevens David (Lecturer in political theory) |
| Pubbl/distr/stampa | New York, New York : , : Oxford University Press, , 2015 |
| Descrizione fisica | 1 online resource (316 p.) |
| Disciplina | 303.5 |
| Soggetto topico |
Extremist Web sites
Radicalism - Computer network resources Religious fanaticism - Computer network resources Internet - Religious aspects Internet - Social aspects Internet - Political aspects Internet - Access control Freedom of information |
| ISBN | 0-19-061296-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Half-title; Title; Copyright; Contents; Acknowledgements; Introduction; Structure and argument; Part I; 1. Religion and the Internet: Some Initial Concepts; Double-click on paradise; Thinking about religion; Thinking about the Internet and the Web; Religion and the Internet; 2. The Polarisation of Online Debate; Villagey globalism; Alone together with digital anomie; The echo chamber of positive feedback; Non-violent and violent engagement; 3. Interventionist Policy Strategies; CONTEST and Prevent; The online component of radicalisation; Problems with Prevent; Legitimacy
Conclusion to Part IPart II; 4. Religion as a Marketplace; From fleeing the lynch mob to running for president; What good is religion?; The market for religious ideas; Religion, moderation and socialisation; The persistence of radicalism and the radicalism of persistence; The CSC and implications for policy; Taking the market model further; 5. The Supply Side: Framing and the Construction of the Centre Ground; Framing in action; A house built on shifting sand; Three examples; Online cognitive restructuring; 6. The Demand Side: The Club Model; Pascalian wagers for high stakes The development of preferencesFive types of religious commitment; 7. The Demand Side: The Motivations of Suicide Bombers; Taking it to the extreme; Suicide Bombing; Specific to Islam?; Constituency costs of violence; The lure of violence; Conclusion to Part II; Part III; 8. The Long Tail; The long-tail thesis; Fitting the model; The democratisation of the forces of distribution; The Devil's long tail?; 9. Echo Chambers and Long Tails: A Critical Examination; How long was that tail again?; Echo chambers revisited; The networked individual; Changing minds; Conclusion; 10. The Hardest Thing What not to doWhat to do; Conclusion: saving cyberspace; Notes; Index |
| Record Nr. | UNINA-9910824035903321 |
Stevens David (Lecturer in political theory)
|
||
| New York, New York : , : Oxford University Press, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Digital privacy in the marketplace : perspectives on the information exchange / / George R. Milne
| Digital privacy in the marketplace : perspectives on the information exchange / / George R. Milne |
| Autore | Milne George R. |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | New York, New York (222 East 46th Street, New York, NY 10017) : , : Business Expert Press, , 2015 |
| Descrizione fisica | 1 online resource (200 p.) |
| Disciplina | 004.678 |
| Collana | Digital and social media marketing and advertising collection |
| Soggetto topico |
Internet - Access control
Teleshopping Computer security Data protection |
| Soggetto genere / forma | Electronic books. |
| Soggetto non controllato |
Privacy
Information Exchange Technology Privacy Harms and Protections Future of Privacy |
| ISBN | 1-60649-849-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | 1. The information environment and the privacy problem -- 2. Why privacy is needed -- 3. Perspectives of privacy: technology history and academic theories -- 4. Information exchange and privacy in the marketplace -- 5. Information based privacy harms -- 6. Forms of protection -- 7. The future of privacy -- References -- Index. |
| Record Nr. | UNINA-9910460646603321 |
Milne George R.
|
||
| New York, New York (222 East 46th Street, New York, NY 10017) : , : Business Expert Press, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||