Atnaujinkite slapukų nuostatas

Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 2526, 2020, Proceedings 2020 ed. [Minkštas viršelis]

Edited by , Edited by
  • Formatas: Paperback / softback, 402 pages, aukštis x plotis: 235x155 mm, weight: 635 g, 73 Illustrations, color; 229 Illustrations, black and white; XI, 402 p. 302 illus., 73 illus. in color., 1 Paperback / softback
  • Serija: Information Systems and Applications, incl. Internet/Web, and HCI 12122
  • Išleidimo metai: 29-May-2020
  • Leidėjas: Springer Nature Switzerland AG
  • ISBN-10: 3030496686
  • ISBN-13: 9783030496685
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 402 pages, aukštis x plotis: 235x155 mm, weight: 635 g, 73 Illustrations, color; 229 Illustrations, black and white; XI, 402 p. 302 illus., 73 illus. in color., 1 Paperback / softback
  • Serija: Information Systems and Applications, incl. Internet/Web, and HCI 12122
  • Išleidimo metai: 29-May-2020
  • Leidėjas: Springer Nature Switzerland AG
  • ISBN-10: 3030496686
  • ISBN-13: 9783030496685
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*





The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy.





*The conference was held virtually due to the COVID-19 pandemic.

Network and Cyber-physical Systems Security.- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).- Managing Secure Inter-slice Communication in 5G Network Slice Chains.- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.- Security Enumerations for Cyber-Physical Systems.- Information Flow and Access Control.- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered.- Network Functions Virtualisation Access Control as a Service.- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.- Information Flow Security Certification for SPARK Programs.- Privacy-preserving Computation.- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.- Non-Interactive Private Decision Tree Evaluation.- Privacy-preserving Anomaly Detection using Synthetic Data.- Local Differentially Private Matrix Factorization with MoG for Recommendations.- Visualization and Analytics for Security.- Designing a Decision-Support Visualization for Live Digital Forensic Investigations.- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud.- PUA Detection Based on Bundle Installer Characteristics.- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.- Spatial Systems and Crowdsourcing Security.- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding.- Crowdsourcing under Data Poisoning Attacks: A Comparative Study.- Self-Enhancing GPS-based Authentication Using Corresponding Address.- Secure Outsourcing and Privacy.- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.- SGX-IR: Secure Information Retrieval with Trusted Processors.- Measuring Readability of Privacy Policies.