Secure IT Systems (eBook, PDF)
19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
Redaktion: Bernsmed, Karin; Fischer-Hübner, Simone
38,95 €
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
19 °P sammeln
38,95 €
Als Download kaufen
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
19 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
38,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
19 °P sammeln
Secure IT Systems (eBook, PDF)
19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings
Redaktion: Bernsmed, Karin; Fischer-Hübner, Simone
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 5.96MB
Andere Kunden interessierten sich auch für
Secure IT Systems (eBook, PDF)38,95 €
Information Security Practice and Experience (eBook, PDF)40,95 €
Computer Security - ESORICS 2014 (eBook, PDF)40,95 €
Computer Security - ESORICS 2014 (eBook, PDF)40,95 €
Security and Trust Management (eBook, PDF)52,95 €
Open Problems in Network Security (eBook, PDF)40,95 €
Computer Security - ESORICS 2016 (eBook, PDF)40,95 €-
-
-
This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 296
- Erscheinungstermin: 6. Oktober 2014
- Englisch
- ISBN-13: 9783319115993
- Artikelnr.: 44127128
- Verlag: Springer International Publishing
- Seitenzahl: 296
- Erscheinungstermin: 6. Oktober 2014
- Englisch
- ISBN-13: 9783319115993
- Artikelnr.: 44127128
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Accountability in Cloud Service Provision Ecosystems.- Information Management and Data Privacy.- Information Classification Issues.- DEICS: Data Erasure in Concurrent Software.- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.- Cloud, Big Data and Virtualization Security.- Security of OS-Level Virtualization Technologies.- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.- pi-Cipher: Authenticated Encryption for Big Data.- What Would it Take for You to Tell Your Secrets to a Cloud? -Studying Decision Factors When Disclosing Information to Cloud Services.- Network Security and Logging.- Efficient Record-Level Keyless Signatures for Audit Logs.- Static Semantics of Secret Channel Abstractions.- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach.- Attacks and Defenses.- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees.- Denial-of-Service Mitigation for Internet Services.- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.- Security in Healthcare and Biometrics.- Patients' Privacy Protection against Insurance Companies in eHealthSystems.- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression.- Poster Papers.- Dynamic Enforcement of Dynamic Policies.- Availability by Design.- Pareto Efficient Solutions of Attack Trees.- Verification of Stateful Protocols: Set-Based Abstractions in theApplied pi-Calculus.- Improvement Proposal for the CryptoCloak Application.- Process Tracking for Forensic Readiness.- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.- Differential Privacy and Private Bayesian Inference.- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design.- Attacks on Privacy-Preserving Biometric Authentication.
Accountability in Cloud Service Provision Ecosystems.- Information Management and Data Privacy.- Information Classification Issues.- DEICS: Data Erasure in Concurrent Software.- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation.- Cloud, Big Data and Virtualization Security.- Security of OS-Level Virtualization Technologies.- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption.- pi-Cipher: Authenticated Encryption for Big Data.- What Would it Take for You to Tell Your Secrets to a Cloud? -Studying Decision Factors When Disclosing Information to Cloud Services.- Network Security and Logging.- Efficient Record-Level Keyless Signatures for Audit Logs.- Static Semantics of Secret Channel Abstractions.- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach.- Attacks and Defenses.- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees.- Denial-of-Service Mitigation for Internet Services.- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch.- Security in Healthcare and Biometrics.- Patients' Privacy Protection against Insurance Companies in eHealthSystems.- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression.- Poster Papers.- Dynamic Enforcement of Dynamic Policies.- Availability by Design.- Pareto Efficient Solutions of Attack Trees.- Verification of Stateful Protocols: Set-Based Abstractions in theApplied pi-Calculus.- Improvement Proposal for the CryptoCloak Application.- Process Tracking for Forensic Readiness.- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol.- Differential Privacy and Private Bayesian Inference.- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design.- Attacks on Privacy-Preserving Biometric Authentication.







