,

Data and Applications Security and Privacy XXXIV

34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

Paperback Engels 2020 9783030496685
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*

The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy.

*The conference was held virtually due to the COVID-19 pandemic.

Specificaties

ISBN13:9783030496685
Taal:Engels
Bindwijze:paperback
Aantal pagina's:400
Uitgever:Springer International Publishing

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Network and Cyber-physical Systems Security.- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).- Managing Secure Inter-slice Communication in 5G Network Slice Chains.- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.- Security Enumerations for Cyber-Physical Systems.- Information Flow and Access Control.- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered.- Network Functions Virtualisation Access Control as a Service.- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.- Information Flow Security Certification for SPARK Programs.- Privacy-preserving Computation.- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.- Non-Interactive Private Decision Tree Evaluation.- Privacy-preserving Anomaly Detection using Synthetic Data.- Local Differentially Private Matrix Factorization with MoG for Recommendations.- Visualization and Analytics for Security.- Designing a Decision-Support Visualization for Live Digital Forensic Investigations.- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud.- PUA Detection Based on Bundle Installer Characteristics.- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.- Spatial Systems and Crowdsourcing Security.- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding.- Crowdsourcing under Data Poisoning Attacks: A Comparative Study.- Self-Enhancing GPS-based Authentication Using Corresponding Address.- Secure Outsourcing and Privacy.- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.- SGX-IR: Secure Information Retrieval with Trusted Processors.- Measuring Readability of Privacy Policies.</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Data and Applications Security and Privacy XXXIV