Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings /: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. ([2020])
- Record Type:
- Book
- Title:
- Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings /: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings. ([2020])
- Main Title:
- Risks and security of internet and systems : 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings
- Other Titles:
- CRiSIS 2019
- Further Information:
- Note: Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem (Eds.).
- Editors:
- Kallel, Slim
Cuppens, Frédéric
Cuppens-Boulahia, Nora
Hadj Kacem, Ahmed - Other Names:
- International Conference on Risks and Security of Internet and Systems, 14th
- Contents:
- Intro -- Preface -- Organization -- Contents -- Risk Analysis and Management -- pQUANT: A User-Centered Privacy Risk Analysis Framework -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Risk Quantification -- 2.2 Privacy Risk Communication -- 3 System Model -- 3.1 Attribute-Entity Model -- 3.2 Some Privacy Related Problems -- 3.3 Privacy Risks Metrics -- 4 pQUANT Components and Design Goals -- 4.1 Design Goals -- 4.2 System Components -- 5 Validation and Discussion -- 6 Summary and Future Work -- References 1 Introduction -- 2 Background -- 3 Asset Identification Approach -- 3.1 Requirements on Asset Identification -- 3.2 Conceptual Model and Asset Classes -- 3.3 Our Method for Systematic Asset Identification -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Access Control and Permission -- Inference Control in Distributed Environment: A Comparison Study -- 1 Introduction -- 2 Access Control vs Inference Control -- 3 Inference Control in Centralized Database Systems -- 3.1 Inference Attacks -- 3.2 Inference Prevention Methods 3.3 Discussion of the Inference Prevention Methods -- 4 Inference Control in Distributed Environment -- 4.1 Inference Control in Distributed Database Systems -- 4.2 Inference Control in Data Integration Systems -- 4.3 Inference and Data Outsourcing -- 5 Research Directions -- 6 Conclusion -- References -- MAPPER: Mapping Application Description to Permissions -- 1 Introduction -- 2 MAPPER Design -- 2.1Intro -- Preface -- Organization -- Contents -- Risk Analysis and Management -- pQUANT: A User-Centered Privacy Risk Analysis Framework -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Risk Quantification -- 2.2 Privacy Risk Communication -- 3 System Model -- 3.1 Attribute-Entity Model -- 3.2 Some Privacy Related Problems -- 3.3 Privacy Risks Metrics -- 4 pQUANT Components and Design Goals -- 4.1 Design Goals -- 4.2 System Components -- 5 Validation and Discussion -- 6 Summary and Future Work -- References 1 Introduction -- 2 Background -- 3 Asset Identification Approach -- 3.1 Requirements on Asset Identification -- 3.2 Conceptual Model and Asset Classes -- 3.3 Our Method for Systematic Asset Identification -- 4 Application Example -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Access Control and Permission -- Inference Control in Distributed Environment: A Comparison Study -- 1 Introduction -- 2 Access Control vs Inference Control -- 3 Inference Control in Centralized Database Systems -- 3.1 Inference Attacks -- 3.2 Inference Prevention Methods 3.3 Discussion of the Inference Prevention Methods -- 4 Inference Control in Distributed Environment -- 4.1 Inference Control in Distributed Database Systems -- 4.2 Inference Control in Data Integration Systems -- 4.3 Inference and Data Outsourcing -- 5 Research Directions -- 6 Conclusion -- References -- MAPPER: Mapping Application Description to Permissions -- 1 Introduction -- 2 MAPPER Design -- 2.1 Overview of MAPPER -- 2.2 Data Collection -- 2.3 Application Description to Permission Modeling -- 2.4 Processing Applications -- 3 Evaluation -- 3.1 Evaluation Setup -- 3.2 Results 6 Conclusions and Future Work -- Acknowledgements -- References -- Continuous Risk Management for Industrial IoT: A Methodological View -- 1 Introduction -- 2 Why Continuous Risk Management for ICS? -- 3 Users, Relevant Stakeholders, and Related Processes -- 4 Related Work -- 5 The Continuous Risk Assessment Methodology -- 5.1 Baseline Risk Assessment -- 5.2 Transition Phase -- 5.3 Continuous Risk Assessment -- 6 Using Bayesian Networks in Risk Estimations -- 7 Future Work -- 8 Conclusions -- References -- Systematic Asset Identification and Modeling During Requirements Engineering An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary Substations -- Abstract -- 1 Introduction -- 2 Research Strategy -- 3 Approach to Cybersecurity Identification and Modelling -- 4 Trial of the Approach on an Industry Pilot on Future Digital Substations -- 4.1 Setting of the Case Study -- 4.2 Process Outline -- 4.3 Results from the Case Study -- 4.4 Experiences and Lessons Learned -- 5 Discussion -- 5.1 To What Degree Are the Requirements Fulfilled? -- 5.2 Threats to Validity and Reliability … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Copyright Date:
- 2020
- Extent:
- 1 online resource (380 pages)
- Subjects:
- 005.8
Computer networks -- Security measures -- Congresses
Internet -- Security measures -- Congresses
Computer security -- Congresses
Computer networks -- Security measures
Computer security
Internet -- Security measures
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030415686
3030415686 - Related ISBNs:
- 9783030415679
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.494227
- Ingest File:
- 03_058.xml