Cargando…

Secure IT Systems 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings /

This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information managemen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Bernsmed, Karin (Editor ), Fischer-Hübner, Simone (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2014.
Edición:1st ed. 2014.
Colección:Security and Cryptology ; 8788
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-319-11599-3
003 DE-He213
005 20220115090510.0
007 cr nn 008mamaa
008 141006s2014 sz | s |||| 0|eng d
020 |a 9783319115993  |9 978-3-319-11599-3 
024 7 |a 10.1007/978-3-319-11599-3  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Secure IT Systems  |h [electronic resource] :  |b 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings /  |c edited by Karin Bernsmed, Simone Fischer-Hübner. 
250 |a 1st ed. 2014. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014. 
300 |a XII, 296 p. 81 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 8788 
505 0 |a Accountability in Cloud Service Provision Ecosystems -- Information Management and Data Privacy -- Information Classification Issues -- DEICS: Data Erasure in Concurrent Software -- A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation -- Cloud, Big Data and Virtualization Security -- Security of OS-Level Virtualization Technologies -- Processing Private Queries over an Obfuscated Database Using Hidden Vector Encryption -- π-Cipher: Authenticated Encryption for Big Data -- What Would it Take for You to Tell Your Secrets to a Cloud? - Studying Decision Factors When Disclosing Information to Cloud Services -- Network Security and Logging -- Efficient Record-Level Keyless Signatures for Audit Logs -- Static Semantics of Secret Channel Abstractions -- Browser Randomisation against Fingerprinting: A Quantitative Information Flow Approach -- Attacks and Defenses -- Attacker Profiling in Quantitative Security Assessment Based on Attack Trees -- Denial-of-Service Mitigation for Internet Services -- Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch -- Security in Healthcare and Biometrics -- Patients' Privacy Protection against Insurance Companies in eHealth Systems -- Segmentation and Normalization of Human Ears Using Cascaded Pose Regression -- Poster Papers -- Dynamic Enforcement of Dynamic Policies -- Availability by Design -- Pareto Efficient Solutions of Attack Trees -- Verification of Stateful Protocols: Set-Based Abstractions in the Applied π-Calculus -- Improvement Proposal for the CryptoCloak Application -- Process Tracking for Forensic Readiness -- Computationally Analyzing the ISO 9798-2.4 Authentication Protocol -- Differential Privacy and Private Bayesian Inference -- Event Invitations in Privacy-Preserving DOSNs: Formalization and Protocol Design -- Attacks on Privacy-Preserving Biometric Authentication. 
520 |a This book constitutes the proceedings of the 19th Nordic Conference on Secure IT Systems, held in Tromsø, Norway, in October 2014. The 15 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They are organized in topical sections named: information management and data privacy; cloud, big data and virtualization security; network security and logging; attacks and defenses; and security in healthcare and biometrics. The volume also contains one full-paper invited talk. 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Biometric identification. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Biometrics. 
700 1 |a Bernsmed, Karin.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Fischer-Hübner, Simone.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783319116006 
776 0 8 |i Printed edition:  |z 9783319115986 
830 0 |a Security and Cryptology ;  |v 8788 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-319-11599-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)