Foundations and Practice of Security (Record no. 91653)

000 -LEADER
fixed length control field 05060nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-3-319-75650-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730183055.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180216s2018 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319756509
-- 978-3-319-75650-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-75650-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Foundations and Practice of Security
Medium [electronic resource] :
Remainder of title 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers /
Statement of responsibility, etc. edited by Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2018.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer International Publishing :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2018.
300 ## - PHYSICAL DESCRIPTION
Extent XIII, 319 p. 82 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 10723
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Access Control -- Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations -- Relationship-Based Access Control for Resharing in Decentralized Online Social Networks -- Secure Protocol of ABAC Certificates Revocation and Delegation -- Formal Verification -- Formal Analysis of Combinations of Secure Protocols -- Formal Analysis of the Fido 1.x Protocol -- Position Paper: A Roadmap for High Assurance Cryptography -- Privacy -- Privacy-preserving Equality Test towards Big Data -- Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy -- Physical Security -- Generation of Applicative Attacks Scenarios Against Industrial Systems -- HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment -- Monitoring of Security Properties Using BeepBeep -- Network Security, Encrypted DBs and Blockchain -- More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization -- ObliviousDB: Practicaland Efficient Searchable Encryption with Controllable Leakage -- Ethereum: state of knowledge and research perspectives -- Vulnerability Analysis and Deception Systems -- Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics -- Extinguishing Ransomware - a Hybrid Approach to Android Ransomware Detection -- Deception in Information Security: Legal Considerations in the Context of German and European Law -- Defence Against Attacks and Anonymity -- SATYA: Defending against Adversarial Attacks using Statistical Hypothesis Testing -- Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric -- Weighted Factors for Evaluating Anonymity.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes revised selected papers from the 10th International Symposium on Foundations and Practice of Security, FPS 2017, held in Nancy, France in October 2017. The 20 papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers were organized in topical sections named: access control; formal verification; privacy; physical security; network security, encrypted DBs and blockchain; vulnerability analysis and deception systems; and defence against attacks and anonymity. .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computers.
9 (RLIN) 8172
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data structures (Computer science).
9 (RLIN) 8188
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information theory.
9 (RLIN) 14256
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Artificial intelligence.
9 (RLIN) 3407
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Application software.
9 (RLIN) 130375
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computing Milieux.
9 (RLIN) 55441
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data Structures and Information Theory.
9 (RLIN) 31923
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Artificial Intelligence.
9 (RLIN) 3407
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer and Information Systems Applications.
9 (RLIN) 130376
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Imine, Abdessamad.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 130377
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fernandez, José M.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 130378
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Marion, Jean-Yves.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 130379
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Logrippo, Luigi.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 130380
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Garcia-Alfaro, Joaquin.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 130381
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 130382
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319756493
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783319756516
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Security and Cryptology,
International Standard Serial Number 2946-1863 ;
Volume/sequential designation 10723
9 (RLIN) 130383
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-319-75650-9">https://doi.org/10.1007/978-3-319-75650-9</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.