Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data and applications security and p...
~
(1998 :)
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data and applications security and privacy XXXIVedited by Anoop Singhal, Jaideep Vaidya.
Reminder of title:
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
remainder title:
Data and applications security and privacy 34
other author:
Singhal, Anoop.
corporate name:
Published:
Cham :Springer International Publishing :2020.
Description:
xi, 402 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Computer securityCongresses.
Online resource:
https://doi.org/10.1007/978-3-030-49669-2
ISBN:
9783030496692$q(electronic bk.)
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
Data and applications security and privacy XXXIV
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /[electronic resource] :Data and applications security and privacy 34edited by Anoop Singhal, Jaideep Vaidya. - Cham :Springer International Publishing :2020. - xi, 402 p. :ill., digital ;24 cm. - Lecture notes in computer science,121220302-9743 ;. - Lecture notes in computer science ;4891..
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
ISBN: 9783030496692$q(electronic bk.)
Standard No.: 10.1007/978-3-030-49669-2doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A55 2020
Dewey Class. No.: 005.8
Data and applications security and privacy XXXIV34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
LDR
:03992nmm a2200385 a 4500
001
592845
003
DE-He213
005
20200703160109.0
006
m d
007
cr nn 008maaau
008
210727s2020 sz s 0 eng d
020
$a
9783030496692$q(electronic bk.)
020
$a
9783030496685$q(paper)
024
7
$a
10.1007/978-3-030-49669-2
$2
doi
035
$a
978-3-030-49669-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A55 2020
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2020
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Data and applications security and privacy XXXIV
$h
[electronic resource] :
$b
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020 : proceedings /
$c
edited by Anoop Singhal, Jaideep Vaidya.
246
3
$a
Data and applications security and privacy 34
246
3
$a
DBSec 2020
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xi, 402 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
12122
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
Network and Cyber-physical Systems Security -- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) -- Managing Secure Inter-slice Communication in 5G Network Slice Chains -- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes -- Security Enumerations for Cyber-Physical Systems -- Information Flow and Access Control -- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered -- Network Functions Virtualisation Access Control as a Service -- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems -- Information Flow Security Certification for SPARK Programs -- Privacy-preserving Computation -- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids -- Non-Interactive Private Decision Tree Evaluation -- Privacy-preserving Anomaly Detection using Synthetic Data -- Local Differentially Private Matrix Factorization with MoG for Recommendations -- Visualization and Analytics for Security -- Designing a Decision-Support Visualization for Live Digital Forensic Investigations -- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud -- PUA Detection Based on Bundle Installer Characteristics -- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool -- Spatial Systems and Crowdsourcing Security -- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding -- Crowdsourcing under Data Poisoning Attacks: A Comparative Study -- Self-Enhancing GPS-based Authentication Using Corresponding Address -- Secure Outsourcing and Privacy -- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation -- SGX-IR: Secure Information Retrieval with Trusted Processors -- Measuring Readability of Privacy Policies.
520
$a
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
384606
650
0
$a
Data protection
$v
Congresses.
$3
384517
650
0
$a
Database security
$v
Congresses.
$3
384616
650
1 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
530743
650
2 4
$a
Cryptology.
$3
825728
650
2 4
$a
Mobile and Network Security.
$3
825732
650
2 4
$a
Artificial Intelligence.
$3
212515
700
1
$a
Singhal, Anoop.
$3
797116
700
1
$a
Vaidya, Jaideep.
$3
260122
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
4891.
$3
383229
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
822022
856
4 0
$u
https://doi.org/10.1007/978-3-030-49669-2
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000192836
電子館藏
1圖書
電子書
EB QA76.9.A25 A615 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-030-49669-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login