標題: Titlebook: Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance; 9th International Wo Joaquin Garcia-Alfaro,Jordi Herrera- [打印本頁] 作者: 指責 時間: 2025-3-21 16:15
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance影響因子(影響力)
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance影響因子(影響力)學(xué)科排名
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance網(wǎng)絡(luò)公開度
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance被引頻次
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance被引頻次學(xué)科排名
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance年度引用
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance年度引用學(xué)科排名
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance讀者反饋
書目名稱Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance讀者反饋學(xué)科排名
作者: 卡死偷電 時間: 2025-3-21 23:24
Data Trustworthiness—Approaches and Research Challengesacademic institutions, it is critical to assess and assure data trustworthiness so that effective decisions can be made based on data. In this paper, we first discuss motivations and relevant techniques for data trustworthiness. We then present an architectural framework for a comprehensive system f作者: 參考書目 時間: 2025-3-22 02:49 作者: Bmd955 時間: 2025-3-22 04:44 作者: 裂隙 時間: 2025-3-22 10:44
The Crypto-Democracy and the Trustworthy (Position Paper)(., major Internet companies, telecom operators, cloud providers, ...) and the individuals from which this personal data is issued. In particular, individuals have no choice but to blindly trust that these entities will respect their privacy and protect their personal data. In this position paper, w作者: 維持 時間: 2025-3-22 16:06
Configuration Behavior of Restrictive Default Privacy Settings on Social Network Sitesture about default settings and the sharing of personal information in social network sites lacks empirical insight into how restrictive default privacy settings influences the behavior of users. To gain empirical insight, a social network site privacy interface prototype was built to investigate th作者: 維持 時間: 2025-3-22 19:17
Towards Inherent Privacy Awareness in Workflowseady at their specification phase. In this direction, the proposed framework, considering the particular technical requirements stemming from data protection principles, is centred around the following features: a novel, ontology-based approach to workflow modelling, which manages, unlike all other 作者: Lipohypertrophy 時間: 2025-3-22 22:52
Index Optimization for L-Diversified Database-as-a-Servicenymization approaches exist that fulfill anonymity notions like .-diversity and can be used to outsource databases. However, indexes on anonymized data significantly differ from plaintext indexes both in terms of usage and possible performance gains. In most cases, it is not clear whether using an a作者: pancreas 時間: 2025-3-23 04:44 作者: 鋸齒狀 時間: 2025-3-23 08:27
Secure Improved Cloud-Based RFID Authentication Protocol technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s data might be prone to privacy invasion and attacks. X作者: 軌道 時間: 2025-3-23 12:26 作者: Genome 時間: 2025-3-23 16:39 作者: AVANT 時間: 2025-3-23 21:52 作者: PALSY 時間: 2025-3-23 23:30
Analysis of Social Engineering Threats with Attack Graphsty of most critical systems is high, the systems remain vulnerable to attacks from social engineers. Social engineering is a technique that: (i) does not require any (advanced) technical tools, (ii)?can be used by anyone, (iii) is cheap..While some research exists for classifying and analysing socia作者: 混合物 時間: 2025-3-24 04:50
Introducing Probabilities in Controller Strategiesntitative security achieved by probabilistic controllers. It extends the framework for specification, analysis, and automatic generation of security controllers provided in?[., .] by considering probabilistic aspects of the behaviour of both the target process and the controller. Controllers may act作者: Consequence 時間: 2025-3-24 09:56
https://doi.org/10.1007/978-3-319-17016-9Anonymity; Authentication; Data privacy; E-commerce; Embedded systems; Machine learning; Malware; Privacy e作者: Working-Memory 時間: 2025-3-24 11:12 作者: Conquest 時間: 2025-3-24 18:17
https://doi.org/10.1007/978-1-349-02617-3e probably been its key to success: anonymity and decentralization. In this paper, we provide a comprehensive description on the details that make such cryptocurrency an interesting research topic in the privacy community. We perform an exhaustive review of the bitcoin anonymity research papers that作者: 修改 時間: 2025-3-24 22:04 作者: CURT 時間: 2025-3-25 03:01 作者: 按時間順序 時間: 2025-3-25 04:24
Communist Power in Europe, 1944-49(. smartphone, tablet or computer) to perform a purchase. Specifically, we present a protocol for privacy-preserving group discounts. The protocol allows a group of buyers to prove how many they are without disclosing their identities. Coupled with an anonymous payment system, this makes group disco作者: 污點 時間: 2025-3-25 08:06
Communist Power in Europe, 1944-49(., major Internet companies, telecom operators, cloud providers, ...) and the individuals from which this personal data is issued. In particular, individuals have no choice but to blindly trust that these entities will respect their privacy and protect their personal data. In this position paper, w作者: Narrative 時間: 2025-3-25 12:04 作者: 打折 時間: 2025-3-25 19:53 作者: 姑姑在炫耀 時間: 2025-3-25 20:19 作者: LOPE 時間: 2025-3-26 03:37 作者: confederacy 時間: 2025-3-26 05:24
https://doi.org/10.1007/978-3-658-30411-9 technology. Several studies have been proposed to tackle the RFID security and privacy concerns under the assumption that the server is secure. In this paper, we assume that the server resides in the cloud that might be insecure, thus the tag’s data might be prone to privacy invasion and attacks. X作者: Pandemic 時間: 2025-3-26 12:15 作者: Arctic 時間: 2025-3-26 14:22 作者: 壓倒 時間: 2025-3-26 20:02
Communities, Neighborhoods, and Healthto derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in existing formalisms, such properties are considered independent. For example, investing more in an attack step would not increase the probability of 作者: 毀壞 時間: 2025-3-27 00:19 作者: Hemiparesis 時間: 2025-3-27 02:22
Lisa Sun-Hee Park,David Naguib Pellowntitative security achieved by probabilistic controllers. It extends the framework for specification, analysis, and automatic generation of security controllers provided in?[., .] by considering probabilistic aspects of the behaviour of both the target process and the controller. Controllers may act作者: 誤傳 時間: 2025-3-27 06:51
Joaquin Garcia-Alfaro,Jordi Herrera-Joancomartí,NeIncludes supplementary material: 作者: 商業(yè)上 時間: 2025-3-27 09:28
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/262998.jpg作者: justify 時間: 2025-3-27 16:47 作者: 閃光你我 時間: 2025-3-27 19:38 作者: OUTRE 時間: 2025-3-27 22:47 作者: Obsessed 時間: 2025-3-28 05:52 作者: MONY 時間: 2025-3-28 08:15 作者: GEON 時間: 2025-3-28 11:24
https://doi.org/10.1007/978-4-431-54774-7e influence of default settings and interface style on the privacy configuration behavior of users. Results show configuration behavior differences between participants having restrictive or permissive privacy default settings. Further, interfaces with multiple pages of privacy settings induce participants to keep their default settings.作者: 混沌 時間: 2025-3-28 17:00
0302-9743 ent, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the?3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security作者: 粗糙濫制 時間: 2025-3-28 21:14 作者: excrete 時間: 2025-3-29 00:07 作者: DEBT 時間: 2025-3-29 06:40
Communist Power in Europe, 1944-49ows a group of buyers to prove how many they are without disclosing their identities. Coupled with an anonymous payment system, this makes group discounts compatible with buyer privacy (that is, buyer anonymity).作者: 狂怒 時間: 2025-3-29 07:20
https://doi.org/10.1007/978-981-10-2879-3bout activation or deactivation of different security mechanisms under certain functional and non-functional requirements. In this paper, the argumentative logic is used to reason about the rationale behind dynamic enforcement of security policies.作者: abreast 時間: 2025-3-29 11:44 作者: Concomitant 時間: 2025-3-29 19:02 作者: 抗生素 時間: 2025-3-29 20:58 作者: STEER 時間: 2025-3-30 02:09
Social Disparities in Health and Health Cares paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.作者: 上流社會 時間: 2025-3-30 05:49 作者: custody 時間: 2025-3-30 08:42 作者: COLIC 時間: 2025-3-30 14:47
Privacy-Preserving Loyalty Programsional reward if he wants to learn more details on the consumer’s profile. Our protocol is based on partially blind signatures and generalization techniques, and provides anonymity to consumers and their purchases, while still allowing negotiated consumer profiling.作者: FECT 時間: 2025-3-30 19:15
Analysis of Social Engineering Threats with Attack Graphss paper, we propose to consider social engineering exploits together with technical vulnerabilities. We introduce a method for the integration of social engineering exploits into attack graphs and propose a simple quantitative analysis of the graphs that helps to develop a comprehensive defensive strategy.作者: 情愛 時間: 2025-3-30 22:59
Introducing Probabilities in Controller Strategiesbilistic setting both active and passive controllers can be expressed by the same model. In a probabilistic setting, however, these two types of controllers can differ. We respectively use the notions of generative and reactive processes to capture this distinction and discuss the different behaviours obtaining in the different settings.作者: 朦朧 時間: 2025-3-31 01:59 作者: 褻瀆 時間: 2025-3-31 07:18
Conference proceedings 2015te talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.