Muutke küpsiste eelistusi

E-raamat: Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers

  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 8247
  • Ilmumisaeg: 20-Mar-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642545689
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 8247
  • Ilmumisaeg: 20-Mar-2014
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783642545689

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities.
Quantifying and Measuring Anonymity.- Data Privacy Management
Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on
Current Smart-Cards and Smart-Phones.- Practical Packing Method in Somewhat
Homomorphic Encryption.- Collaborative and Privacy-Aware Sensing for
Observing Urban Movement Patterns.- Parallel Implementation of GC-Based MPC
Protocols in the Semi-Honest Setting.- Privacy Analysis of a Hidden
Friendship Protocol.- Anonymous and Transferable Electronic Ticketing
Scheme.- Privacy-Preserving Publish/Subscribe: Efficient Protocols in a
Distributed Model.- Privacy-Preserving Processing of Raw Genomic Data.- Using
Search Results to Microaggregate Query Logs Semantically.- Legal Issues About
Metadata Data Privacy vs Information Security.- Privacy-Preserving
Multi-Party Reconciliation Secure in the Malicious Model.- Differentially
Private Smart Metering with Battery Recharging.- AppGuard Fine-Grained
Policy Enforcement for Untrusted Android Applications.- Autonomous and
Spontaneous Security Reference Monitors for Security and Interoperability in
OAuth 2.0.- Remote Biometrics for Robust Persistent
Authentication.- Classifying Android Malware through Subgraph
Mining.- Introducing Probabilities in Contract-Based Approaches for Mobile
Application Security.- Advanced Detection Tool for PDF Threats.- Enforcing
Input Validation through Aspect Oriented Programming.- Lightweight
Cryptography for Embedded Systems A Comparative Analysis.- A Simulation of
Document Detection Methods and Reducing False Positives for Private Stream
Searching.- Dynamic Anonymous Index for Confidential Data.- Are On-Line
Personae Really Un linkable.- On the Privacy of Private Browsing A Forensic
Approach.- Privacy-Preserving Trust Management Mechanisms from Private
Matching Schemes.