Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Data and applications security and p...
~
Annual IFIP WG 11.3 Working Conference on Data and Applications Security (2025 :)
Linked to FindBook
Google Book
Amazon
博客來
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Data and applications security and privacy XXXIX/ edited by Sokratis Katsikas, Basit Shafiq.
Reminder of title:
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
remainder title:
Data and applications security and privacy 39
other author:
Katsikas, Sokratis.
corporate name:
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xiii, 458 p. :ill., digital ;24 cm.
[NT 15003449]:
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-96590-6
ISBN:
9783031965906
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
Data and applications security and privacy XXXIX
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /[electronic resource] :Data and applications security and privacy 39edited by Sokratis Katsikas, Basit Shafiq. - Cham :Springer Nature Switzerland :2025. - xiii, 458 p. :ill., digital ;24 cm. - Lecture notes in computer science,157221611-3349 ;. - Lecture notes in computer science ;15722..
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gjøvik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.
ISBN: 9783031965906
Standard No.: 10.1007/978-3-031-96590-6doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Data and applications security and privacy XXXIX = 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
LDR
:04193nmm a2200397 a 4500
001
2413349
003
DE-He213
005
20250623130235.0
006
m d
007
cr nn 008maaau
008
260205s2025 sz s 0 eng d
020
$a
9783031965906
$q
(electronic bk.)
020
$a
9783031965890
$q
(paper)
024
7
$a
10.1007/978-3-031-96590-6
$2
doi
035
$a
978-3-031-96590-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A615 2025
111
2
$a
Annual IFIP WG 11.3 Working Conference on Data and Applications Security
$n
(39th :
$d
2025 :
$c
Gjøvik, Norway)
$3
3789358
245
1 0
$a
Data and applications security and privacy XXXIX
$h
[electronic resource] :
$b
39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy, DBSec 2025, Gjøvik, Norway, June 23-24, 2025 : proceedings /
$c
edited by Sokratis Katsikas, Basit Shafiq.
246
3
$a
Data and applications security and privacy 39
246
3
$a
DBSec 2025
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xiii, 458 p. :
$b
ill., digital ;
$c
24 cm.
338
$a
online resource
$b
cr
$2
rdacarrier
490
1
$a
Lecture notes in computer science,
$x
1611-3349 ;
$v
15722
505
0
$a
AI applications in security and privacy. -- Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications. -- Automated Privacy Policy Analysis using Large Language Models. -- Data Chameleon:˜a self-adaptive synthetic data management system. -- Operating Under Constraints: Identifying Requirements for Enhanced Cyber Resilience Management. -- Towards the Identification of Vulnerability-Fixing Code Lines in OSS Security Patches Using Lexical Code Segmentation and LLMs. -- Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning. -- Hallucination Detection in Large Language Models using Diversion Decoding. -- User and data privacy. -- Blockchain-Enhanced User Consent for GDPR-Compliant Real-Time Bidding. -- Enabling Right to be Forgotten in a Collaborative Environment using Permissioned Blockchains. -- P-EDR: Privacy-preserving Event-driven Data Release using Smart Contracts. -- Performance-Efficient Anti-fingerprinting for Privacy. -- Privacy Management in Cyber-Physical Systems: The DUCA Framework. -- Database and storage security. -- Bloom Filter Look-Up Tables for Private and Secure Distributed Databases in Web3. -- Purpose Filter: A space-efficient purpose metadata storage. -- Secure and Reliable Digital Wallets: A Threat Model for Secure Storage in eIDAS 2.0. -- Differential privacy. -- Facility Location Problem under Local Differential Privacy without Super-set Assumption. -- Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks?. -- Attackers and attack detection. -- Metadata Assisted Supply-Chain Attack Detection for Ansible. -- Diffusion-based Adversarial Purification for Intrusion Detection. -- Feature Identification and Study of Attackers' Behaviours Using Honeypots. -- Access control & Internal Controls and Audit process. -- Supporting Delegation in Outsourced ICA Process. -- Transaction Logs in Access Control: Leveraging an Under-Utilized Data Source. -- Cryptography for security and privacy. -- The Privacy Impact of Dash Mixing Fee Payments. -- Cryptanalysis and Modification of a Variant of Matrix Operation for Randomization or Encryption (v-MORE).
520
$a
This book constitutes the refereed proceedings of the 39th IFIP WG 11.3 Annual Conference on Data and Applications Security and Privacy XXXIX, DBSec 2025, held in Gjøvik, Norway, during June 23-24, 2025. The 19 full papers and 5 short papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: AI applications in security and privacy; User and data privacy; Database and storage security; Differential privacy; Attackers and attack detection; Access control & Internal Controls and Audit process; and Cryptography for security and privacy.
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
0
$a
Internet
$x
Security measures
$v
Congresses.
$3
844596
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
0
$a
Database security
$v
Congresses.
$3
738112
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Data Structures and Information Theory.
$3
3382368
650
2 4
$a
Database Management System.
$3
3591759
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Katsikas, Sokratis.
$3
893229
700
1
$a
Shafiq, Basit.
$3
1923469
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
15722.
$3
3789359
856
4 0
$u
https://doi.org/10.1007/978-3-031-96590-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9518804
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login