語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Data and applications security and p...
~
(1998 :)
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data and applications security and privacy XXXIVedited by Anoop Singhal, Jaideep Vaidya.
其他題名:
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
其他題名:
Data and applications security and privacy 34
其他作者:
Singhal, Anoop.
團體作者:
出版者:
Cham :Springer International Publishing :2020.
面頁冊數:
xi, 402 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-3-030-49669-2
ISBN:
9783030496692$q(electronic bk.)
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
Data and applications security and privacy XXXIV
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /[electronic resource] :Data and applications security and privacy 34edited by Anoop Singhal, Jaideep Vaidya. - Cham :Springer International Publishing :2020. - xi, 402 p. :ill., digital ;24 cm. - Lecture notes in computer science,121220302-9743 ;. - Lecture notes in computer science ;4891..
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
ISBN: 9783030496692$q(electronic bk.)
Standard No.: 10.1007/978-3-030-49669-2doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A55 2020
Dewey Class. No.: 005.8
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
LDR
:03992nmm a2200385 a 4500
001
592845
003
DE-He213
005
20200703160109.0
006
m d
007
cr nn 008maaau
008
210727s2020 sz s 0 eng d
020
$a
9783030496692$q(electronic bk.)
020
$a
9783030496685$q(paper)
024
7
$a
10.1007/978-3-030-49669-2
$2
doi
035
$a
978-3-030-49669-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A55 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Data and applications security and privacy XXXIV
$h
[electronic resource] :
$b
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
$c
edited by Anoop Singhal, Jaideep Vaidya.
246
3
$a
Data and applications security and privacy 34
246
3
$a
DBSec 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xi, 402 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12122
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
520
$a
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
384606
650
0
$a
Data protection
$v
Congresses.
$3
384517
650
0
$a
Database security
$v
Congresses.
$3
384616
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Artificial Intelligence.
$3
212515
700
1
$a
Singhal, Anoop.
$3
797116
700
1
$a
Vaidya, Jaideep.
$3
260122
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
822022
856
4 0
$u
https://doi.org/10.1007/978-3-030-49669-2
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000192836
電子館藏
1圖書
電子書
EB QA76.9.A25 A615 2020 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-3-030-49669-2
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入