Normal view MARC view ISBD view

Emerging Technologies for Authorization and Authentication [electronic resource] : Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings / edited by Andrea Saracino, Paolo Mori.

Contributor(s): Saracino, Andrea [editor.] | Mori, Paolo [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 11967Publisher: Cham : Springer International Publishing : Imprint: Springer, 2020Edition: 1st ed. 2020.Description: X, 189 p. 180 illus., 28 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030397494.Subject(s): Data protection | Computer networks  | Computer systems | Software engineering | Artificial intelligence | Data and Information Security | Computer Communication Networks | Computer System Implementation | Software Engineering | Artificial IntelligenceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario.
    average rating: 0.0 (0 votes)
No physical items for this record

Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.

This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario.

There are no comments for this item.

Log in to your account to post a comment.