000 | 04933nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-65172-4 | ||
003 | DE-He213 | ||
005 | 20240730172814.0 | ||
007 | cr nn 008mamaa | ||
008 | 240713s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031651724 _9978-3-031-65172-4 |
||
024 | 7 |
_a10.1007/978-3-031-65172-4 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aData and Applications Security and Privacy XXXVIII _h[electronic resource] : _b38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings / _cedited by Anna Lisa Ferrara, Ram Krishnan. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aXV, 342 p. 100 illus., 77 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14901 |
|
505 | 0 | _a -- Access Control. -- A Graph-based Framework for ABAC Policy Enforcement and Analysis. -- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. -- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. -- Crypto Application. -- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. -- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. -- Towards Atomicity and Composability in Cross-Chain NFTs. -- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. -- Privacy. -- DT-Anon: Decision Tree Target-Driven Anonymization. -- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. -- Attack. -- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. -- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. -- Optimal Automated Generation of Playbooks. -- ML Attack, Vulnerablity. -- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. -- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. -- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. -- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. -- Security User Studies. -- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. -- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. -- Differential Privacy. -- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. -- Does Differential Privacy Prevent Backdoor Attacks in Practice?. | |
520 | _aThis book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aDatabase management. _93157 |
|
650 | 0 |
_aApplication software. _9105561 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputing Milieux. _955441 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aDatabase Management System. _932540 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9105565 |
700 | 1 |
_aFerrara, Anna Lisa. _eeditor. _0(orcid) _10000-0002-1026-5729 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105566 |
|
700 | 1 |
_aKrishnan, Ram. _eeditor. _0(orcid) _10000-0002-7402-553X _4edt _4http://id.loc.gov/vocabulary/relators/edt _9105568 |
|
710 | 2 |
_aSpringerLink (Online service) _9105571 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031651717 |
776 | 0 | 8 |
_iPrinted edition: _z9783031651731 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14901 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-65172-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c88565 _d88565 |