Trust and Trustworthy Computing [[electronic resource] ] : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings / / edited by Jonathan McCune, Boris Balacheff, Adrian Perrig, Ahmad-Reza Sadeghi, Angela Sasse, Yolanta Beres |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (VII, 314 p. 77 illus., 49 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Management information systems Computer science Algorithms Computers and civilization Application software Cryptology Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society Information Systems Applications (incl. Internet) |
ISBN | 3-642-21599-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465383603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 441 p. 84 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer programming Management information systems Computer science Algorithms Computers and civilization Computer Communication Networks Cryptology Programming Techniques Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN |
1-280-38747-5
9786613565396 3-642-13869-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Technical Strand—Full Papers -- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform -- SBAP: Software-Based Attestation for Peripherals -- Key Attestation from Trusted Execution Environments -- Anonymous Authentication with TLS and DAA -- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation -- Towards a Trusted Mobile Desktop -- Application of Trusted Computing in Automation to Prevent Product Piracy -- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy -- ?TSS – A Simplified Trusted Software Stack -- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture -- A DAA Scheme Using Batch Proof and Verification -- A Pairing-Based DAA Scheme Further Reducing TPM Resources -- An Anonymous Attestation Scheme with Optional Traceability -- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms -- Technical Strand—Short Papers -- Escrowed Data and the Digital Envelope -- Engineering Attestable Services -- Dynamic Enforcement of Platform Integrity -- An Improved Memory Integrity Protection Scheme -- Robust Combiners for Software Hardening -- The PUF Promise -- Socio-Economic Strand -- Privacy Requirements Engineering for Trustworthy e-Government Services -- Can Competitive Insurers Improve Network Security? -- Nudge: Intermediaries’ Role in Interdependent Network Security -- How the Public Views Strategies Designed to Reduce the Threat of Botnets -- Axiomatic and Behavioural Trust -- The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org -- The Role of Soft Information in Trust Building: Evidence from Online Social Lending -- Software on the Witness Stand: What Should It Take for Us to Trust It? -- Workshop on Trust in the Cloud -- Token-Based Cloud Computing -- Workshop on Security Hardware -- Oblivious Transfer Based on Physical Unclonable Functions. |
Record Nr. | UNISA-996466438903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust and Trustworthy Computing [[electronic resource] ] : Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings / / edited by Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XIII, 441 p. 84 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Computer programming Management information systems Computer science Algorithms Computers and civilization Computer Communication Networks Cryptology Programming Techniques Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN |
1-280-38747-5
9786613565396 3-642-13869-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Technical Strand—Full Papers -- Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform -- SBAP: Software-Based Attestation for Peripherals -- Key Attestation from Trusted Execution Environments -- Anonymous Authentication with TLS and DAA -- Group-Based Attestation: Enhancing Privacy and Management in Remote Attestation -- Towards a Trusted Mobile Desktop -- Application of Trusted Computing in Automation to Prevent Product Piracy -- Lagrangian E-Voting: Verifiability on Demand and Strong Privacy -- ?TSS – A Simplified Trusted Software Stack -- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture -- A DAA Scheme Using Batch Proof and Verification -- A Pairing-Based DAA Scheme Further Reducing TPM Resources -- An Anonymous Attestation Scheme with Optional Traceability -- Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing -- SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms -- Technical Strand—Short Papers -- Escrowed Data and the Digital Envelope -- Engineering Attestable Services -- Dynamic Enforcement of Platform Integrity -- An Improved Memory Integrity Protection Scheme -- Robust Combiners for Software Hardening -- The PUF Promise -- Socio-Economic Strand -- Privacy Requirements Engineering for Trustworthy e-Government Services -- Can Competitive Insurers Improve Network Security? -- Nudge: Intermediaries’ Role in Interdependent Network Security -- How the Public Views Strategies Designed to Reduce the Threat of Botnets -- Axiomatic and Behavioural Trust -- The Leap of Faith from Online to Offline: An Exploratory Study of Couchsurfing.org -- The Role of Soft Information in Trust Building: Evidence from Online Social Lending -- Software on the Witness Stand: What Should It Take for Us to Trust It? -- Workshop on Trust in the Cloud -- Token-Based Cloud Computing -- Workshop on Security Hardware -- Oblivious Transfer Based on Physical Unclonable Functions. |
Record Nr. | UNINA-9910484560303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 476 p.) |
Disciplina | 005.1 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Software engineering
Application software Information storage and retrieval Computer communication systems Computers and civilization Management information systems Computer science Software Engineering/Programming and Operating Systems Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-34297-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. |
Record Nr. | UNISA-996466164903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 476 p.) |
Disciplina | 005.1 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Software engineering
Application software Information storage and retrieval Computer communication systems Computers and civilization Management information systems Computer science Software Engineering/Programming and Operating Systems Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-34297-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. |
Record Nr. | UNINA-9910483671803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 428 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Information storage and retrieval Computer communication systems Computers and civilization Management information systems Computer science Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 9783540320401 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost of Attacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System. |
Record Nr. | UNISA-996465717303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust Management [[electronic resource] ] : Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings / / edited by Peter Herrmann, Valerie Issarny, Simon Shiu |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XII, 428 p.) |
Disciplina | 004 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Application software
Information storage and retrieval Computer communication systems Computers and civilization Management information systems Computer science Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 9783540320401 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Third International Conference on Trust Management -- Foraging for Trust: Exploring Rationality and the Stag Hunt Game -- Trust, Untrust, Distrust and Mistrust – An Exploration of the Dark(er) Side -- Security and Trust in the Italian Legal Digital Signature Framework -- Specifying Legal Risk Scenarios Using the CORAS Threat Modelling Language -- On Deciding to Trust -- Trust Management Survey -- Can We Manage Trust? -- Operational Models for Reputation Servers -- A Representation Model of Trust Relationships with Delegation Extensions -- Affect and Trust -- Reinventing Forgiveness: A Formal Investigation of Moral Facilitation -- Modeling Social and Individual Trust in Requirements Engineering Methodologies -- Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms -- A Probabilistic Trust Model for Handling Inaccurate Reputation Sources -- Trust as a Key to Improving Recommendation Systems -- Alleviating the Sparsity Problem of Collaborative Filtering Using Trust Inferences -- Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment -- Interactive Credential Negotiation for Stateful Business Processes -- An Evidence Based Architecture for Efficient, Attack-Resistant Computational Trust Dissemination in Peer-to-Peer Networks -- Towards an Evaluation Methodology for Computational Trust Systems -- Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy -- Trust Transfer: Encouraging Self-recommendations Without Sybil Attack -- Privacy-Preserving Search and Updates for Outsourced Tree-Structured Data on Untrusted Servers -- Persistent and Dynamic Trust: Analysis and the Related Impact of Trusted Platforms -- Risk Models for Trust-Based Access Control(TBAC) -- Combining Trust and Risk to Reduce the Cost of Attacks -- IWTrust: Improving User Trust in Answers from the Web -- Trust Record: High-Level Assurance and Compliance -- Implementation of the SECURE Trust Engine -- The CORAS Tool for Security Risk Analysis -- Towards a Grid Platform Enabling Dynamic Virtual Organisations for Business Applications -- Multimedia Copyright Protection Platform Demonstrator -- ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements -- The VoteSecureTM Secure Internet Voting System. |
Record Nr. | UNINA-9910483188203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust Management in Cloud Services [[electronic resource] /] / by Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya |
Autore | Noor Talal H |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (130 p.) |
Disciplina |
004
004.6 005.7 005.74 |
Soggetto topico |
Application software
Computer communication systems Management information systems Computer science Business Management science Information Systems Applications (incl. Internet) Computer Communication Networks Management of Computing and Information Systems Business and Management, general |
ISBN | 3-319-12250-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Background -- Trust Management and Discovery of Cloud Services -- Robust and Adaptive Credibility Model -- Scalable Availability Model -- Cloud Service Crawler Engine -- Implementation and Performance Study -- Conclusions. |
Record Nr. | UNINA-9910298979903321 |
Noor Talal H | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 247 p. 66 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Application software Management information systems Computer science Computer communication systems Systems and Data Security Software Engineering Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-64483-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy in Mobile Environments -- Transparence and Privacy Enhancing Technologies -- Security Measures -- Cloud - IoT Security and Privacy -- Security Awareness and Social Engineering - Policy Languages. |
Record Nr. | UNINA-9910483288403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trust, Privacy and Security in Digital Business [[electronic resource] ] : 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings / / edited by Javier Lopez, Simone Fischer-Hübner, Costas Lambrinoudakis |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 247 p. 66 illus.) |
Disciplina | 658.478 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Data encryption (Computer science) Application software Management information systems Computer science Computer communication systems Systems and Data Security Software Engineering Cryptology Information Systems Applications (incl. Internet) Management of Computing and Information Systems Computer Communication Networks |
ISBN | 3-319-64483-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy in Mobile Environments -- Transparence and Privacy Enhancing Technologies -- Security Measures -- Cloud - IoT Security and Privacy -- Security Awareness and Social Engineering - Policy Languages. |
Record Nr. | UNISA-996466176003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|