Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data and applications security and p...
~
Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2024 :)
Linked to FindBook
Google Book
Amazon
博客來
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data and applications security and privacy XXXVIII/ edited by Anna Lisa Ferrara, Ram Krishnan.
Reminder of title:
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
remainder title:
Data and applications security and privacy 38
other author:
Ferrara, Anna Lisa.
corporate name:
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Published:
Cham :Springer Nature Switzerland : : 2024.,
Description:
xv, 342 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-65172-4
ISBN:
9783031651724
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
Data and applications security and privacy XXXVIII
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /[electronic resource] :Data and applications security and privacy 38edited by Anna Lisa Ferrara, Ram Krishnan. - Cham :Springer Nature Switzerland :2024. - xv, 342 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,149011611-3349 ;. - Lecture notes in computer science ;14901..
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
ISBN: 9783031651724
Standard No.: 10.1007/978-3-031-65172-4doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / A56 2024
Dewey Class. No.: 005.8
Data and applications security and privacy XXXVIII = 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
LDR
:03594nmm a2200385 a 4500
001
2373913
003
DE-He213
005
20240713130851.0
006
m d
007
cr nn 008maaau
008
241231s2024 sz s 0 eng d
020
$a
9783031651724
$q
(electronic bk.)
020
$a
9783031651717
$q
(paper)
024
7
$a
10.1007/978-3-031-65172-4
$2
doi
035
$a
978-3-031-65172-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
A56 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2024
111
2
$a
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
$n
(38th :
$d
2024 :
$c
San Jose, Calif.)
$3
3722374
245
1 0
$a
Data and applications security and privacy XXXVIII
$h
[electronic resource] :
$b
38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024 : proceedings /
$c
edited by Anna Lisa Ferrara, Ram Krishnan.
246
3
$a
Data and applications security and privacy 38
246
3
$a
DBSec 2024
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xv, 342 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
14901
505
0
$a
Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
520
$a
This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
0
$a
Database security
$v
Congresses.
$3
738112
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Database Management System.
$3
3591759
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Ferrara, Anna Lisa.
$3
3662980
700
1
$a
Krishnan, Ram.
$3
3594587
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14901.
$3
3722375
856
4 0
$u
https://doi.org/10.1007/978-3-031-65172-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9494362
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A56 2024
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login