語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data and Applications Security and P...
~
SpringerLink (Online service)
Data and Applications Security and Privacy XXXIV = 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Data and Applications Security and Privacy XXXIV/ edited by Anoop Singhal, Jaideep Vaidya.
其他題名:
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
其他作者:
Vaidya, Jaideep.
面頁冊數:
XI, 402 p. 302 illus., 73 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-49669-2
ISBN:
9783030496692
Data and Applications Security and Privacy XXXIV = 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
Data and Applications Security and Privacy XXXIV
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /[electronic resource] :edited by Anoop Singhal, Jaideep Vaidya. - 1st ed. 2020. - XI, 402 p. 302 illus., 73 illus. in color.online resource. - Information Systems and Applications, incl. Internet/Web, and HCI ;12122. - Information Systems and Applications, incl. Internet/Web, and HCI ;9149.
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
ISBN: 9783030496692
Standard No.: 10.1007/978-3-030-49669-2doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Data and Applications Security and Privacy XXXIV = 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
LDR
:04188nam a22004215i 4500
001
1020316
003
DE-He213
005
20200703160109.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030496692
$9
978-3-030-49669-2
024
7
$a
10.1007/978-3-030-49669-2
$2
doi
035
$a
978-3-030-49669-2
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Data and Applications Security and Privacy XXXIV
$h
[electronic resource] :
$b
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings /
$c
edited by Anoop Singhal, Jaideep Vaidya.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XI, 402 p. 302 illus., 73 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
12122
505
0
$a
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
520
$a
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Application software.
$3
528147
650
0
$a
Computer security.
$3
557122
700
1
$a
Vaidya, Jaideep.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1197917
700
1
$a
Singhal, Anoop.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1197053
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030496685
776
0 8
$i
Printed edition:
$z
9783030496708
830
0
$a
Information Systems and Applications, incl. Internet/Web, and HCI ;
$v
9149
$3
1253558
856
4 0
$u
https://doi.org/10.1007/978-3-030-49669-2
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入