Data and Applications Security and Privacy XXXVIII (Record no. 88565)

000 -LEADER
fixed length control field 04933nam a22006615i 4500
001 - CONTROL NUMBER
control field 978-3-031-65172-4
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172814.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240713s2024 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783031651724
-- 978-3-031-65172-4
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Data and Applications Security and Privacy XXXVIII
Sub Title 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 342 p. 100 illus., 77 illus. in color.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 -- Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.
700 1# - AUTHOR 2
Author 2 Ferrara, Anna Lisa.
700 1# - AUTHOR 2
Author 2 Krishnan, Ram.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-3-031-65172-4
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database management.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computing Milieux.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Structures and Information Theory.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Database Management System.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer and Information Systems Applications.
700 1# - AUTHOR 2
-- (orcid)
-- 0000-0002-1026-5729
700 1# - AUTHOR 2
-- (orcid)
-- 0000-0002-7402-553X
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1611-3349 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC

No items available.