語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emerging Technologies for Authorizat...
~
Saracino, Andrea.
Emerging Technologies for Authorization and Authentication = Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Emerging Technologies for Authorization and Authentication/ edited by Andrea Saracino, Paolo Mori.
其他題名:
Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
其他作者:
Mori, Paolo.
面頁冊數:
X, 189 p. 180 illus., 28 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-39749-4
ISBN:
9783030397494
Emerging Technologies for Authorization and Authentication = Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
Emerging Technologies for Authorization and Authentication
Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /[electronic resource] :edited by Andrea Saracino, Paolo Mori. - 1st ed. 2020. - X, 189 p. 180 illus., 28 illus. in color.online resource. - Security and Cryptology ;11967. - Security and Cryptology ;9241.
Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario.
ISBN: 9783030397494
Standard No.: 10.1007/978-3-030-39749-4doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Emerging Technologies for Authorization and Authentication = Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
LDR
:03108nam a22004095i 4500
001
1018385
003
DE-He213
005
20201021140617.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030397494
$9
978-3-030-39749-4
024
7
$a
10.1007/978-3-030-39749-4
$2
doi
035
$a
978-3-030-39749-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Emerging Technologies for Authorization and Authentication
$h
[electronic resource] :
$b
Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /
$c
edited by Andrea Saracino, Paolo Mori.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
X, 189 p. 180 illus., 28 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11967
505
0
$a
Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
520
$a
This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Software Engineering/Programming and Operating Systems.
$3
669780
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Computer System Implementation.
$3
669803
650
2 4
$a
Computer Communication Networks.
$3
669310
650
1 4
$a
Security.
$3
1114130
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Software engineering.
$3
562952
650
0
$a
Computers.
$3
565115
650
0
$a
Architecture, Computer.
$3
1255731
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Data protection.
$3
557764
700
1
$a
Mori, Paolo.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1205898
700
1
$a
Saracino, Andrea.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1211097
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030397487
776
0 8
$i
Printed edition:
$z
9783030397500
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-39749-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入