Image from Google Jackets

Secure IT Systems [electronic resource] : 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings / edited by Karin Bernsmed, Simone Fischer-Hübner.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 8788Publication details: Cham : Springer International Publishing, 2014.Description: 1 online resource (XII, 296 p. 81 ill.)ISBN:
  • 9783319115993
Subject(s): Online resources:
Contents:
Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000024895ENG
Total holds: 0

Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication.

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India