Foundations and practice of security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers /: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers. (2018)
- Record Type:
- Book
- Title:
- Foundations and practice of security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers /: 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers. (2018)
- Main Title:
- Foundations and practice of security : 10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised selected papers
- Other Titles:
- FPS 2017
- Further Information:
- Note: Abdessamad Imine, José M. Fernandez, Jean-Yves Marion, Luigi Logrippo, Joaquin Garcia-Alfaro (eds.).
- Editors:
- Imine, Abdessamad
Fernández, José M
Marion, Jean-Yves
Logrippo, L (Luigi)
Garcia-Alfaro, Joaquin - Other Names:
- FPS (Symposium), 10th
- Contents:
- Access Control -- Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations -- Relationship-Based Access Control for Resharing in Decentralized Online Social Networks -- Secure Protocol of ABAC Certificates Revocation and Delegation -- Formal Verification -- Formal Analysis of Combinations of Secure Protocols -- Formal Analysis of the Fido 1.x Protocol -- Position Paper: A Roadmap for High Assurance Cryptography -- Privacy -- Privacy-preserving Equality Test towards Big Data -- Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy -- Physical Security -- Generation of Applicative Attacks Scenarios Against Industrial Systems -- HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment -- Monitoring of Security Properties Using BeepBeep -- Network Security, Encrypted DBs and Blockchain -- More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization -- ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage -- Ethereum: state of knowledge and research perspectives -- Vulnerability Analysis and Deception Systems -- Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics -- Extinguishing Ransomware -- a Hybrid Approach to Android Ransomware Detection -- Deception in Information Security: Legal Considerations in the Context of German and European Law -- Defence Against Attacks andAccess Control -- Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations -- Relationship-Based Access Control for Resharing in Decentralized Online Social Networks -- Secure Protocol of ABAC Certificates Revocation and Delegation -- Formal Verification -- Formal Analysis of Combinations of Secure Protocols -- Formal Analysis of the Fido 1.x Protocol -- Position Paper: A Roadmap for High Assurance Cryptography -- Privacy -- Privacy-preserving Equality Test towards Big Data -- Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy -- Physical Security -- Generation of Applicative Attacks Scenarios Against Industrial Systems -- HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment -- Monitoring of Security Properties Using BeepBeep -- Network Security, Encrypted DBs and Blockchain -- More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization -- ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage -- Ethereum: state of knowledge and research perspectives -- Vulnerability Analysis and Deception Systems -- Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics -- Extinguishing Ransomware -- a Hybrid Approach to Android Ransomware Detection -- Deception in Information Security: Legal Considerations in the Context of German and European Law -- Defence Against Attacks and Anonymity -- SATYA: Defending against Adversarial Attacks using Statistical Hypothesis Testing -- Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric -- Weighted Factors for Evaluating Anonymity. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xiii, 319 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Information Systems Applications (incl. Internet)
Computers -- Security -- General
Computers -- Social Aspects -- Human-Computer Interaction
Computers -- Information Theory
Computers -- Intelligence (AI) & Semantics
Computers -- Information Technology
Computer security
Information technology: general issues
Algorithms & data structures
Artificial intelligence
Information retrieval
Data protection
Computer security
Data structures (Computer science)
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319756509
3319756508 - Related ISBNs:
- 9783319756493
3319756494 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed February 19, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.374604
- Ingest File:
- 02_355.xml