E-Book, Englisch, 402 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
Singhal / Vaidya Data and Applications Security and Privacy XXXIV
Erscheinungsjahr 2020
ISBN: 978-3-030-49669-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings
E-Book, Englisch, 402 Seiten, eBook
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-030-49669-2
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Network and Cyber-physical Systems Security.- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).- Managing Secure Inter-slice Communication in 5G Network Slice Chains.- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.- Security Enumerations for Cyber-Physical Systems.- Information Flow and Access Control.- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered.- Network Functions Virtualisation Access Control as a Service.- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.- Information Flow Security Certification for SPARK Programs.- Privacy-preserving Computation.- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.- Non-Interactive Private Decision Tree Evaluation.- Privacy-preserving Anomaly Detection using Synthetic Data.- Local Differentially Private Matrix Factorization with MoG for Recommendations.- Visualization and Analytics for Security.- Designing a Decision-Support Visualization for Live Digital Forensic Investigations.- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud.- PUA Detection Based on Bundle Installer Characteristics.- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.- Spatial Systems and Crowdsourcing Security.- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding.- Crowdsourcing under Data Poisoning Attacks: A Comparative Study.- Self-Enhancing GPS-based Authentication Using Corresponding Address.- Secure Outsourcing and Privacy.- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.- SGX-IR: Secure Information Retrieval with Trusted Processors.- Measuring Readability of Privacy Policies.