Data and Applications Security and Privacy XXV

Data and Applications Security and Privacy XXV
Author :
Publisher : Springer Science & Business Media
Total Pages : 319
Release :
ISBN-10 : 9783642223471
ISBN-13 : 3642223478
Rating : 4/5 (71 Downloads)

Synopsis Data and Applications Security and Privacy XXV by : Yingjiu Li

This book constitutes the refereed proceedings of the 25th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2011, held in Richmond, VA, USA, in July 2011. The 14 revised full papers and 9 short papers presented together with 3 invited lectures were carefully reviewed and selected from 37 submissions. The topics of these papers include access control, privacy-preserving data applications, data confidentiality and query verification, query and data privacy, authentication and secret sharing.

Data and Applications Security and Privacy XXXIV

Data and Applications Security and Privacy XXXIV
Author :
Publisher : Springer Nature
Total Pages : 405
Release :
ISBN-10 : 9783030496692
ISBN-13 : 3030496694
Rating : 4/5 (92 Downloads)

Synopsis Data and Applications Security and Privacy XXXIV by : Anoop Singhal

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.* The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions. The papers present high-quality original research from academia, industry, and government on theoretical and practical aspects of information security. They are organized in topical sections named network and cyber-physical systems security; information flow and access control; privacy-preserving computation; visualization and analytics for security; spatial systems and crowdsourcing security; and secure outsourcing and privacy. *The conference was held virtually due to the COVID-19 pandemic.

Data Privacy Games

Data Privacy Games
Author :
Publisher : Springer
Total Pages : 187
Release :
ISBN-10 : 9783319779652
ISBN-13 : 3319779656
Rating : 4/5 (52 Downloads)

Synopsis Data Privacy Games by : Lei Xu

With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Emerging Technologies in Data Mining and Information Security

Emerging Technologies in Data Mining and Information Security
Author :
Publisher : Springer Nature
Total Pages : 754
Release :
ISBN-10 : 9789811940521
ISBN-13 : 9811940525
Rating : 4/5 (21 Downloads)

Synopsis Emerging Technologies in Data Mining and Information Security by : Paramartha Dutta

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during 23–25 February 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.

Data and Applications Security and Privacy XXXVII

Data and Applications Security and Privacy XXXVII
Author :
Publisher : Springer Nature
Total Pages : 415
Release :
ISBN-10 : 9783031375866
ISBN-13 : 3031375866
Rating : 4/5 (66 Downloads)

Synopsis Data and Applications Security and Privacy XXXVII by : Vijayalakshmi Atluri

This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19–21, 2023. The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.

Tunable Security for Deployable Data Outsourcing

Tunable Security for Deployable Data Outsourcing
Author :
Publisher : KIT Scientific Publishing
Total Pages : 282
Release :
ISBN-10 : 9783731504115
ISBN-13 : 3731504111
Rating : 4/5 (15 Downloads)

Synopsis Tunable Security for Deployable Data Outsourcing by : Koehler, Jens

Security mechanisms like encryption negatively affect other software quality characteristics like efficiency. To cope with such trade-offs, it is preferable to build approaches that allow to tune the trade-offs after the implementation and design phase. This book introduces a methodology that can be used to build such tunable approaches. The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management.

Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications

Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications
Author :
Publisher : IGI Global
Total Pages : 2124
Release :
ISBN-10 : 9781522539247
ISBN-13 : 1522539247
Rating : 4/5 (47 Downloads)

Synopsis Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications by : Management Association, Information Resources

Professionals in the interdisciplinary field of computer science focus on the design, operation, and maintenance of computational systems and software. Methodologies and tools of engineering are utilized alongside computer applications to develop efficient and precise information databases. Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as utility computing, computer security, and information systems applications, this multi-volume book is ideally designed for academicians, researchers, students, web designers, software developers, and practitioners interested in computer systems and software engineering.

Collaborative Efforts for Understanding the Human Brain

Collaborative Efforts for Understanding the Human Brain
Author :
Publisher : Frontiers Media SA
Total Pages : 192
Release :
ISBN-10 : 9782889630295
ISBN-13 : 2889630293
Rating : 4/5 (95 Downloads)

Synopsis Collaborative Efforts for Understanding the Human Brain by : Sook-Lei Liew

The human brain is incredibly complex, and the more we learn about it, the more we realize how much we need a truly interdisciplinary team to make sense of its intricacies. This eBook presents the latest efforts in collaborative team science from around the world, all aimed at understanding the human brain.

Security Engineering and Intelligence Informatics

Security Engineering and Intelligence Informatics
Author :
Publisher : Springer
Total Pages : 479
Release :
ISBN-10 : 9783642405884
ISBN-13 : 3642405886
Rating : 4/5 (84 Downloads)

Synopsis Security Engineering and Intelligence Informatics by : Alfredo Cuzzocrea

This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.

Data and Applications Security and Privacy XXVI

Data and Applications Security and Privacy XXVI
Author :
Publisher : Springer
Total Pages : 341
Release :
ISBN-10 : 9783642315404
ISBN-13 : 3642315402
Rating : 4/5 (04 Downloads)

Synopsis Data and Applications Security and Privacy XXVI by : Nora Cuppens-Boulahia

This book constitutes the refereed proceedings of the 26th IFIP WG 11.3 International Conference on Data and Applications Security and Privacy, DBSec 2012, held in Paris, France in July 2012. The 17 revised full and 15 short papers presented together with 1 invited paper were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on access control, confidentiality and privacy, smart cards security, privacy-preserving technologies, data management, intrusion and malware, probabilistic attacks and protection, and cloud computing.