Muutke küpsiste eelistusi

Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers [Pehme köide]

  • Formaat: Paperback / softback, 400 pages, kõrgus x laius: 235x155 mm, kaal: 6321 g, 105 Illustrations, black and white; XVII, 400 p. 105 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 8247
  • Ilmumisaeg: 02-Apr-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 364254567X
  • ISBN-13: 9783642545672
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 400 pages, kõrgus x laius: 235x155 mm, kaal: 6321 g, 105 Illustrations, black and white; XVII, 400 p. 105 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 8247
  • Ilmumisaeg: 02-Apr-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 364254567X
  • ISBN-13: 9783642545672
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities.
Quantifying and Measuring Anonymity.- Data Privacy Management
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on
Current Smart-Cards and Smart-Phones.- Practical Packing Method in Somewhat
Homomorphic Encryption.- Collaborative and Privacy-Aware Sensing for
Observing Urban Movement Patterns.- Parallel Implementation of GC-Based MPC
Protocols in the Semi-Honest Setting.- Privacy Analysis of a Hidden
Friendship Protocol.- Anonymous and Transferable Electronic Ticketing
Scheme.- Privacy-Preserving Publish/Subscribe: Efficient Protocols in a
Distributed Model.- Privacy-Preserving Processing of Raw Genomic Data.- Using
Search Results to Microaggregate Query Logs Semantically.- Legal Issues About
Metadata Data Privacy vs Information Security.- Privacy-Preserving
Multi-Party Reconciliation Secure in the Malicious Model.- Differentially
Private Smart Metering with Battery Recharging.- AppGuard Fine-Grained
Policy Enforcement for Untrusted Android Applications.- Autonomous and
Spontaneous Security Reference Monitors for Security and Interoperability in
OAuth 2.0.- Remote Biometrics for Robust Persistent
Authentication.- Classifying Android Malware through Subgraph
Mining.- Introducing Probabilities in Contract-Based Approaches for Mobile
Application Security.- Advanced Detection Tool for PDF Threats.- Enforcing
Input Validation through Aspect Oriented Programming.- Lightweight
Cryptography for Embedded Systems A Comparative Analysis.- A Simulation of
Document Detection Methods and Reducing False Positives for Private Stream
Searching.- Dynamic Anonymous Index for Confidential Data.- Are On-Line
Personae Really Un linkable.- On the Privacy of Private Browsing A Forensic
Approach.- Privacy-Preserving Trust Management Mechanisms from Private
Matching Schemes.