Data Privacy Management and Security Assurance, Livraga
Автор: Guojun Wang; Indrakshi Ray; Jose M. Alcaraz Calero Название: Security, Privacy and Anonymity in Computation, Communication and Storage ISBN: 331949144X ISBN-13(EAN): 9783319491448 Издательство: Springer Рейтинг: Цена: 9224.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016;
Автор: Joaquin Garcia-Alfaro; Guillermo Navarro-Arribas; Название: Data Privacy Management and Autonomous Spontaneous Security ISBN: 3642112064 ISBN-13(EAN): 9783642112065 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: 4th International Workshop DPM 2009 and Second International Workshop SETOP 2009 St Malo France Sep. .
Автор: Barthe Название: Security and Trust Management ISBN: 331946597X ISBN-13(EAN): 9783319465975 Издательство: Springer Рейтинг: Цена: 6988.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.
The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.
Автор: Badonnel Название: Management and Security in the Age of Hyperconnectivity ISBN: 331939813X ISBN-13(EAN): 9783319398136 Издательство: Springer Рейтинг: Цена: 7267.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Network Element Stability Aware Method for Verifying Configuration Changesin Mobile Communication Networks.- A Framework for Publish/Subscribe Protocol Transitions in Mobile Crowds.- Cloud Flat Rates Enabled via Fair Multi-resource Consumption.- Decentralized Solutions for Monitoring Large-Scale Software-Defined Networks.- S3N - Smart Solution for Substation Networks, an Architecture for theManagement of Communication Networks in Power Substations.- Towards a QoS-oriented Migration Management Approach for Virtualized Network.- Functional Decomposition in 5G Networks.- An NFC Relay Attack with Off-the-Shelf Hardware and Software.- Analysis and Evaluation of OpenFlow Message Usage for Security Applications.- On the Readiness of NDN for a Secure Deployment: The Case of Pending Interest Table.- In Whom Do We Trust - Sharing Security Events.- Network Defence Using Attacker-Defender Interaction Modelling.- Evaluating Reputation of Internet Entities.- Detecting Advanced Network Threats Using Similarity Search.- How to Achieve Early Botnet Detection at the Provider Level?.- Anycast and Its Potential for DDoS Mitigation.- Context-Aware Location Management of Groups of Devices in 5G Networks.- Scalability and Information Exchange among Autonomous Resource Management Agents.- Analysis of Vertical Scans Discovered by Naive Detection.
Автор: Samir Kumar Bandyopadhyay; Wael Adi; Tai-hoon Kim; Название: Information Security and Assurance ISBN: 3642133649 ISBN-13(EAN): 9783642133640 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed proceedings of the 4th International Conference on Information Security and Assurance, ISA 2010, held in Miyazaki, Japan, in June 2010.
Автор: Aspinall Название: Privacy and Identity Management. Time for a Revolution? ISBN: 3319417622 ISBN-13(EAN): 9783319417622 Издательство: Springer Рейтинг: Цена: 12857.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Modelling the Relationship between Privacy and Security Perceptionsand the Acceptance of Surveillance Practices.- The US Privacy Strategy.- Smart Society: Collaboration between Humans and Machines, Promises and Perils.- An Experience with a De-identifying Task to Inform about Privacy Issues.- A4CloudWorkshop: Accountability in the Cloud.- Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.- Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies.- Smart Technologies: Workshop on Challenges and Trends for Privacy in a Hyper-connected World.- Privacy Pattern Catalogue: A Tool for Integrating Privacy Principlesof ISO/IEC 29100 into the Software Development Process.- Developing a Structured Metric to Measure Privacy Risk in Privacy Impact Assessments.- Accountability in the EU Data Protection Reform - Moving from Theory to Practice.- Towards Authenticity and Privacy Preserving Accountable Workflows.- A Technique for Enhanced Provision of Appropriate Access to Evidence across Service Provision Chains.- Evidence-Based Security and Privacy Assurance in Cloud Ecosystems.- Enhanced Assurance about Cloud Service Provision Promises.- ALOC: Attribute Level of Confidence for a User-Centric Attribute Assurance.- Identity Theft through e-Government Services: Government to Pay the Bill?.- "All Your Data Are Belong to Us". European Perspectives on Privacy Issues in Free Online Machine Translation Services.- Identification of Online Gamblers in the EU: A Two-Edged Sword.- Can Courts Provide Effective Remedies against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom.- Automated Log Audits for Privacy Compliance Validation: A Literature Survey.- Privacy-Preserving Access Control in Publicly Readable Storage Systems.- Ontology-Based Obfuscation and Anonymisation for Privacy - A Case Study on Healthcare.
Автор: Liu Название: Information Security and Privacy ISBN: 3319403664 ISBN-13(EAN): 9783319403663 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function.
Автор: Liu Название: Information Security and Privacy ISBN: 3319402528 ISBN-13(EAN): 9783319402529 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security;
Автор: Tryfonas Название: Human Aspects of Information Security, Privacy, and Trust ISBN: 3319393804 ISBN-13(EAN): 9783319393803 Издательство: Springer Рейтинг: Цена: 7826.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
User Identification Using Games.- Hermes: Hands-Free Authentication in Physical Spaces.- Implicit Authentication for Mobile Devices Using Typing Behavior.- Fraud Protection for Online Banking - A User-Centered Approach on Detecting Typical Double-Dealings due to Social Engineering and Inobservance whilst Operating with Personal Login Credentials.- Vibration Based Tangible Tokens for Intuitive Pairing among Smart Devices.- Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.- An Integration of Usable Security and User Authentication into the ISO 9241-210 and ISO/IEC 25010:2011.- Secure Communication Protocol between a Human and a Bank Server for Preventing Man-in-the-Browser Attacks.- Proposed Privacy Patterns for Privacy Preserving Healthcare Systems in Accord with Nova Scotia's Personal Health Information Act.- Information Security Application Design: Understanding Your Users.- Responsibility Modelling and Its Application Trust Management.- Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks.- Current Trend of End-users' Behaviors towards Security Mechanisms.- Share to Protect - Quantitative Study on Privacy Issues in V2X-Technology.- The Impact of Security Cues on User Perceived Security in E-Commerce.- Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret: Policy Lessons for Government after the Snowden Leaks.- Optional Data Disclosure and the Online Privacy Paradox: A UK Perspective.- Assessing the Feasibility of Adaptive Security Models for the Internet of Things.- OpenStack Firewall as a Service Rule Analyser.- Interactive Discovery and Retrieval of Web Resources Containing Home Made Explosive Recipes.- Attack Tree Analysis for Insider Threats on the IoT Using Isabelle.- The State of Near-Field Communication (NFC) on the Android platform.- Towards a Usable Framework for Modelling Security and Privacy Risks in the Smart Home.- A Taxonomy to Classify Risk End-user Profile in Interaction with the Computing Environment.- Security Middleware Programming Using P4.
Автор: Fausto Pedro Garc?a M?rquez; Benjamin Lev Название: Big Data Management ISBN: 3319454978 ISBN-13(EAN): 9783319454979 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on the analytic principles of business practice and big data. Specifically, it provides an interface between the main disciplines of engineering/technology and the organizational and administrative aspects of management, serving as a complement to books in other disciplines such as economics, finance, marketing and risk analysis. The contributors present their areas of expertise, together with essential case studies that illustrate the successful application of engineering management theories in real-life examples.
Автор: Yun Q. Shi Название: Transactions on Data Hiding and Multimedia Security IV ISBN: 3642017568 ISBN-13(EAN): 9783642017568 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is used in various applications. This title is suitable for researchers in these fields.
Автор: Gene Tsudik Название: Financial Cryptography and Data Security ISBN: 3540852298 ISBN-13(EAN): 9783540852292 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed post-conference proceedings of the 12th International Conference on Financial Cryptography and Data Security, FC 2008, held in Cozumel, Mexico. This title covers papers organized in topical sections on attacks and counter measures, protocols, theory, hardware, chips and tags, signatures and encryption, as well as e-cash.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru