語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
ICT systems security and privacy pro...
~
Clark Conference ((2005 :)
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
005.8
書名/作者:
ICT systems security and privacy protection : 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings // edited by Hannes Federrath, Dieter Gollmann.
其他題名:
SEC 2015
其他作者:
Federrath, Hannes.
團體作者:
Clark Conference
出版者:
Cham : : Springer International Publishing :, 2015.
面頁冊數:
xvi, 646 p. : : ill., digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Computer security
標題:
Computer networks - Handbooks, manuals, etc. - Security measures
標題:
Internet - Congresses. - Security measures
標題:
Computer Science.
標題:
Systems and Data Security.
標題:
Management of Computing and Information Systems.
標題:
Computer Communication Networks.
標題:
Data Encryption.
ISBN:
9783319184678 (electronic bk.)
ISBN:
9783319184661 (paper)
內容註:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet's Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
摘要、提要註:
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
電子資源:
http://dx.doi.org/10.1007/978-3-319-18467-8
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
ICT systems security and privacy protection
30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /[electronic resource] :SEC 2015edited by Hannes Federrath, Dieter Gollmann. - Cham :Springer International Publishing :2015. - xvi, 646 p. :ill., digital ;24 cm. - IFIP advances in information and communication technology,4551868-4238 ;. - IFIP advances in information and communication technology ;370..
O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet's Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
ISBN: 9783319184678 (electronic bk.)
Standard No.: 10.1007/978-3-319-18467-8doiSubjects--Topical Terms:
158051
Computer security
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
ICT systems security and privacy protection[electronic resource] :30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
LDR
:04959nmm a2200349 a 4500
001
438777
003
DE-He213
005
20151228161106.0
006
m d
007
cr nn 008maaau
008
160315s2015 gw s 0 eng d
020
$a
9783319184678 (electronic bk.)
020
$a
9783319184661 (paper)
024
7
$a
10.1007/978-3-319-18467-8
$2
doi
035
$a
978-3-319-18467-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I23 2015
111
2
$a
Clark Conference
$d
(2005 :
$c
Sterling and Francine Clark Art Institute)
$3
347558
245
1 0
$a
ICT systems security and privacy protection
$h
[electronic resource] :
$b
30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015 : proceedings /
$c
edited by Hannes Federrath, Dieter Gollmann.
246
3
$a
SEC 2015
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
xvi, 646 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
IFIP advances in information and communication technology,
$x
1868-4238 ;
$v
455
505
0
$a
O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet's Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios.
520
$a
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
650
0
$a
Computer security
$3
158051
650
0
$a
Computer networks
$x
Security measures
$v
Handbooks, manuals, etc.
$3
350968
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
470623
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Management of Computing and Information Systems.
$3
466225
650
2 4
$a
Computer Communication Networks.
$3
464535
650
2 4
$a
Data Encryption.
$3
465773
700
1
$a
Federrath, Hannes.
$3
626276
700
1
$a
Gollmann, Dieter.
$3
626277
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
IFIP advances in information and communication technology ;
$v
370.
$3
466992
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-18467-8
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-319-18467-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入