Foundations and Practice of Security
Springer International Publishing (Verlag)
978-3-319-75649-3 (ISBN)
The 20 papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers were organized in topical sections named: access control; formal verification; privacy; physical security; network security, encrypted DBs and blockchain; vulnerability analysis and deception systems; and defence against attacks and anonymity.
Access Control.- Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.- Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.- Secure Protocol of ABAC Certificates Revocation and Delegation.- Formal Verification.- Formal Analysis of Combinations of Secure Protocols.- Formal Analysis of the Fido 1.x Protocol.- Position Paper: A Roadmap for High Assurance Cryptography.- Privacy.- Privacy-preserving Equality Test towards Big Data.- Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy.- Physical Security.- Generation of Applicative Attacks Scenarios Against Industrial Systems.- HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment.- Monitoring of Security Properties Using BeepBeep.- Network Security, Encrypted DBs and Blockchain.- More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization.- ObliviousDB: Practicaland Efficient Searchable Encryption with Controllable Leakage.- Ethereum: state of knowledge and research perspectives.- Vulnerability Analysis and Deception Systems.- Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.- Extinguishing Ransomware - a Hybrid Approach to Android Ransomware Detection.- Deception in Information Security: Legal Considerations in the Context of German and European Law.- Defence Against Attacks and Anonymity.- SATYA: Defending against Adversarial Attacks using Statistical Hypothesis Testing.- Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric.- Weighted Factors for Evaluating Anonymity.
Erscheinungsdatum | 16.03.2018 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 319 p. 82 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 510 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Access Control • Applications • Artificial Intelligence • authentication • computer crime • Computer Networks • computer operating systems • Computer Science • conference proceedings • cryptography • data privacy • Data Security • Encryption • graph theory • Informatics • Internet • Intrusion Detection • Network Security • privacy • Research • Semantics • Telecommunication networks |
ISBN-10 | 3-319-75649-4 / 3319756494 |
ISBN-13 | 978-3-319-75649-3 / 9783319756493 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich