|
Showing 1 - 8 of
8 matches in All Departments
|
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Paperback, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
|
R4,284
Discovery Miles 42 840
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 36th IFIP TC
11 International Conference on Information Security and Privacy
Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28
full papers presented were carefully reviewed and selected from 112
submissions. The papers present novel research on theoretical and
practical aspects of security and privacy protection in ICT
systems. They are organized in topical sections on digital
signatures; vulnerability management; covert channels and
cryptography; application and system security; privacy; network
security; machine learning for security; and security management.
*The conference was held virtually.
|
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings (Hardcover, 1st ed. 2021)
Audun Josang, Lynn Futcher, Janne Hagen
|
R4,316
Discovery Miles 43 160
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 36th IFIP TC
11 International Conference on Information Security and Privacy
Protection, SEC 2021, held in Oslo, Norway, in June 2021.*The 28
full papers presented were carefully reviewed and selected from 112
submissions. The papers present novel research on theoretical and
practical aspects of security and privacy protection in ICT
systems. They are organized in topical sections on digital
signatures; vulnerability management; covert channels and
cryptography; application and system security; privacy; network
security; machine learning for security; and security management.
*The conference was held virtually.
This is the first comprehensive treatment of subjective logic and
all its operations. The author developed the approach, and in this
book he first explains subjective opinions, opinion representation,
and decision-making under vagueness and uncertainty, and he then
offers a full definition of subjective logic, harmonising the key
notations and formalisms, concluding with chapters on trust
networks and subjective Bayesian networks, which when combined form
general subjective networks. The author shows how real-world
situations can be realistically modelled with regard to how
situations are perceived, with conclusions that more correctly
reflect the ignorance and uncertainties that result from partially
uncertain input arguments. The book will help researchers and
practitioners to advance, improve and apply subjective logic to
build powerful artificial reasoning models and tools for solving
real-world problems. A good grounding in discrete mathematics is a
prerequisite.
This is the first comprehensive treatment of subjective logic and
all its operations. The author developed the approach, and in this
book he first explains subjective opinions, opinion representation,
and decision-making under vagueness and uncertainty, and he then
offers a full definition of subjective logic, harmonising the key
notations and formalisms, concluding with chapters on trust
networks and subjective Bayesian networks, which when combined form
general subjective networks. The author shows how real-world
situations can be realistically modelled with regard to how
situations are perceived, with conclusions that more correctly
reflect the ignorance and uncertainties that result from partially
uncertain input arguments. The book will help researchers and
practitioners to advance, improve and apply subjective logic to
build powerful artificial reasoning models and tools for solving
real-world problems. A good grounding in discrete mathematics is a
prerequisite.
This book constitutes the refereed proceedings of the 17th Nordic
Conference on Secure IT Systems, NordSec 2012, held in Karlskrona,
Sweden, in October 2012. The 16 revised papers were carefully
reviewed and selected from 32 submissions. The papers are organized
in topical sections on application security, security management,
system security, network security, and trust management.
|
Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010, Proceedings (Hardcover, Edition.)
Masakatsu Nishigaki, Audun Josang, Yuko Murayama, Stephen Marsh
|
R1,589
Discovery Miles 15 890
|
Ships in 10 - 15 working days
|
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP
WG 11.11 International Conference on Trust Management, held in
Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided
a truly global platform for the reporting of research, development,
policy, and practice in the interdependent arrears of privacy, se-
rity, and trust. Building on the traditions inherited from the
highly succe- ful iTrust conference series, the IFIPTM 2007
conference in Moncton, New Brunswick, Canada, the IFIPTM 2008
conference in Trondheim, Norway, and the IFIPTM 2009 conference at
Purdue University in Indiana, USA, IFIPTM 2010 focused on trust,
privacy and security from multidisciplinary persp- tives. The
conference is an arena for discussion on relevant problems from
both research and practice in the areas of academia, business, and
government. IFIPTM 2010 was an open IFIP conference. The program of
the conference featured both theoretical research papers and
reports of real-world case studies. IFIPTM 2010 received 61
submissions from 25 di?erent countries: Japan (10), UK (6), USA
(6), Canada (5), Germany (5), China (3), Denmark (2), India (2),
Italy (2), Luxembourg (2), The Netherlands (2), Switzerland (2),
Taiwan (2), Austria, Estonia, Finland, France, Ireland, Israel,
Korea, Malaysia, Norway, Singapore, Spain, Turkey. The Program
Committee selected 18 full papers for presentation and inclusion in
the proceedings. In addition, the program and the proceedings
include two invited papers by academic experts in the ?elds of
trust management, privacy and security, namely, Toshio Yamagishi
and Pamela Briggs
The NordSec workshops were started in 1996 with the aim of bringing
together - searchers and practitioners within computer security in
the Nordic countries - thereby establishing a forum for discussions
and co-operation between universities, industry and computer
societies. Since then, the workshop has developed into a fully
fledged inter- tional information security conference, held in the
Nordic countries on a round robin basis. The 14th Nordic Conference
on Secure IT Systems was held in Oslo on 14-16 October 2009. Under
the theme Identity and Privacy in the Internet Age, this year's
conference explored policies, strategies and technologies for
protecting identities and the growing flow of personal information
passing through the Internet and mobile n- works under an
increasingly serious threat picture. Among the contemporary
security issues discussed were security services modeling, Petri
nets, attack graphs, electronic voting schemes, anonymous payment
schemes, mobile ID-protocols, SIM cards, n- work embedded systems,
trust, wireless sensor networks, privacy, privacy disclosure
regulations, financial cryptography, PIN verification, temporal
access control, random number generators, and some more. As a
pre-cursor to the conference proper, the Nordic Security Day on
Wednesday 14 October hosted talks by leading representatives from
industry, academia and the g- ernment sector, and a press
conference was given.
|
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Audun Josang, Pierangela Samarati, Marinella Petrocchi
|
R1,569
Discovery Miles 15 690
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed post-conference
proceedings of the 8th International Workshop on Security and Trust
Management, STM 2012, held in Pisa, Italy, in September 2012 - in
conjunction with the 17th European Symposium Research in Computer
Security (ESORICS 2012). The 20 revised full papers were carefully
reviewed and selected from 57 submissions. The papers are organized
into topical sections on policy enforcement and monitoring; access
control; trust, reputation, and privacy; distributed systems and
physical security; authentication and security policies.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|