Atjaunināt sīkdatņu piekrišanu

E-grāmata: Data and Applications Security and Privacy XXXIV: 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings

Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*





The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy.





*The conference was held virtually due to the COVID-19 pandemic.

Network and Cyber-physical Systems Security.- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV).- Managing Secure Inter-slice Communication in 5G Network Slice Chains.- Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.- Security Enumerations for Cyber-Physical Systems.- Information Flow and Access Control.- Inference-Proof Monotonic Query Evaluation and View Generation Reconsidered.- Network Functions Virtualisation Access Control as a Service.- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management Systems.- Information Flow Security Certification for SPARK Programs.- Privacy-preserving Computation.- Provably Privacy-Preserving Distributed Data Aggregation in Smart Grids.- Non-Interactive Private Decision Tree Evaluation.- Privacy-preserving Anomaly Detection using Synthetic Data.- Local Differentially Private Matrix Factorization with MoG for Recommendations.- Visualization and Analytics for Security.- Designing a Decision-Support Visualization for Live Digital Forensic Investigations.- Predictive Analytics to Prevent Voice Over IP International Revenue Sharing Fraud.- PUA Detection Based on Bundle Installer Characteristics.- ML-supported Identification and Prioritization of Threats in the OVVL Threat Modelling Tool.- Spatial Systems and Crowdsourcing Security.- Enhancing the Performance of Spatial Queries on Encrypted Data through Graph Embedding.- Crowdsourcing under Data Poisoning Attacks: A Comparative Study.- Self-Enhancing GPS-based Authentication Using Corresponding Address.- Secure Outsourcing and Privacy.- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL Evaluation.- SGX-IR: Secure Information Retrieval with Trusted Processors.- Measuring Readability of Privacy Policies.