0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (9)
  • R2,500 - R5,000 (15)
  • -
Status
Brand

Showing 1 - 24 of 24 matches in All Departments

E-Business and Telecommunications - 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised... E-Business and Telecommunications - 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers (1st ed. 2023)
Pierangela Samarati, Marten Van Sinderen, Sabrina de Capitani di Vimercati, Fons Wijnhoven
R2,482 Discovery Miles 24 820 Ships in 10 - 15 working days

The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021. The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December... Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings (Paperback, 1st ed. 2017)
Joseph K. Liu, Pierangela Samarati
R3,156 Discovery Miles 31 560 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track.

Secure Cloud Computing (Hardcover, 2014 ed.): Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup,... Secure Cloud Computing (Hardcover, 2014 ed.)
Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, …
R4,254 Discovery Miles 42 540 Ships in 10 - 15 working days

This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters address security issues of the cloud infrastructure. In Chapter 3, Szefer and Lee describe a hardware-enhanced security architecture that protects the confidentiality and integrity of a virtual machine's memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software-Defined Networking (SDN) is deployed within and across clouds. Chapters 5-9 focus on the protection of data stored in the cloud. In Chapter 5, Wang et al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from some or all other users, without any cooperation from cloud service providers. In Chapter 6, De Capitani di Vimercati, Foresti, and Samarati describe emerging approaches for protecting data stored externally and for enforcing fine-grained and selective accesses on them, and illustrate how the combination of these approaches can introduce new privacy risks. In Chapter 7, Le, Kant, and Jajodia explore data access challenges in collaborative enterprise computing environments where multiple parties formulate their own authorization rules, and discuss the problems of rule consistency, enforcement, and dynamic updates. In Chapter 8, Smith et al. address key challenges to the practical realization of a system that supports query execution over remote encrypted data without exposing decryption keys or plaintext at the server. In Chapter 9, Sun et al. provide an overview of secure search techniques over encrypted data, and then elaborate on a scheme that can achieve privacy-preserving multi-keyword text search. The next three chapters focus on the secure deployment of computations to the cloud. In Chapter 10, Oktay el al. present a risk-based approach for workload partitioning in hybrid clouds that selectively outsources data and computation based on their level of sensitivity. The chapter also describes a vulnerability assessment framework for cloud computing environments. In Chapter 11, Albanese et al. present a solution for deploying a mission in the cloud while minimizing the mission's exposure to known vulnerabilities, and a cost-effective approach to harden the computational resources selected to support the mission. In Chapter 12, Kontaxis et al. describe a system that generates computational decoys to introduce uncertainty and deceive adversaries as to which data and computation is legitimate. The last section of the book addresses issues related to security monitoring and system resilience. In Chapter 13, Zhou presents a secure, provenance-based capability that captures dependencies between system states, tracks state changes over time, and that answers attribution questions about the existence, or change, of a system's state at a given time. In Chapter 14, Wu et al. present a monitoring capability for multicore architectures that runs monitoring threads concurrently with user or kernel code to constantly check for security violations. Finally, in Chapter 15, Hasan Cam describes how to manage the risk and resilience of cyber-physical systems by employing controllability and observability techniques for linear and non-linear systems.

Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and... Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain (Paperback, Softcover reprint of the original 1st ed. 2004)
Csilla Farkas, Pierangela Samarati
R2,991 Discovery Miles 29 910 Ships in 10 - 15 working days

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems. Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include: -Database theory; -Inference control; -Data protection techniques; -Distributed systems; -Access control models; -Security policy; -Design and management; -Privacy; -Network security. This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004. Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Paperback, Softcover reprint of the original 1st ed. 2003)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R3,027 Discovery Miles 30 270 Ships in 10 - 15 working days

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)... Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) (Paperback, Softcover reprint of the original 1st ed. 2000)
Vijay Atluri, Pierangela Samarati
R2,957 Discovery Miles 29 570 Ships in 10 - 15 working days

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings... Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012, Proceedings (Paperback, 2012 ed.)
Feng Bao, Pierangela Samarati, Jianying Zhou
R1,649 Discovery Miles 16 490 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,630 Discovery Miles 46 300 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2... Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices - 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010, Proceedings (Paperback, Edition.)
Pierangela Samarati, Michael Tunstall, Joachim Posegga, Konstantinos Markantonakis, Damien Sauveron
R1,590 Discovery Miles 15 900 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 4th Wo- shop on Information Security Theory and Practice (WISTP 2010), held during April 12-14, 2010 in Passau, Germany. In response to the call for papers, 69 papers were submitted to the wo- shop. These papers were evaluated on the basis of their signi?cance, novelty, and technicalquality. Eachpaper was reviewedby four members of the Program Committee. Reviewing was double-blind meaning that the Program Committee was not able to see the names and a?liations of the authors, and the authors were not told which committee members reviewed which papers. The Program Committee meeting was held electronically, holding intensive discussions over a periodoftwo weeks.Of the papers submitted, 20 full papersand 10shortpapers were selected for presentation at the workshop. This workshop was sponsored by Vodaphone, who also provided a best - per award. We would like to thank this organization for their support, which helped make this workshop possible. Their continued support helps to reduce registration fees and make WISTP a continuing success. WISTP 2010 was also organized in cooperation with the International - sociation for Cryptologic Research (IACR), the IFIP WG 11.2 Pervasive S- tems Security, and ACM SIGSAC. Their support has signi?cantly contributed to raising the pro?le of WISTP, which is re?ected in the number of high-quality submissions that we received.

Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009... Information Security - 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings (Paperback, 2009 ed.)
Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio Agostino Ardagna
R3,030 Discovery Miles 30 300 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009.

The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.

Privacy in Location-Based Applications - Research Issues and Emerging Trends (Paperback, 2009 ed.): Claudio Bettini, Sushil... Privacy in Location-Based Applications - Research Issues and Emerging Trends (Paperback, 2009 ed.)
Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Sean X. Wang
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain.

This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services.

The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.

Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP... Proceedings of the IFIP TC 11 23rd International Information Security Conference - IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy (Hardcover, 2008 ed.)
Sushil Jajodia, Pierangela Samarati, Stelvio Cimato
R4,963 Discovery Miles 49 630 Ships in 10 - 15 working days

These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September 8-10, 2008 in Milan, Italy. In - sponse to the call for papers, 143 papers were submitted to the conference. All - pers were evaluated on the basis of their signi?cance, novelty, and technical quality, and reviewed by at least three members of the program committee. Reviewing was blind meaning that the authors were not told which committee members reviewed which papers. The program committee meeting was held electronically, holding - tensive discussion over a period of three weeks. Of the papers submitted, 42 full papers and 11 short papers were selected for presentation at the conference. A conference like this just does not happen; it depends on the volunteer efforts of a host of individuals. There is a long list of people who volunteered their time and energy to put together the conference and who deserve acknowledgment. We thank all members of the program committee and the external reviewers for their hard work in the paper evaluation. Due to the large number of submissions, p- gram committee members were required to complete their reviews in a short time frame. We are especially thankful to them for the commitment they showed with their active participation in the electronic discussion

Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30,... Public Key Infrastructure - 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings (Paperback, 2007 ed.)
Pierangela Samarati, Josep L. Ferrer
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 4th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2007, held in Palma de Mallorca, Spain in June 2007.

The 21 revised full papers and 8 short papers presented were carefully reviewed and selected from 77 submissions. The papers address all current issues in PKI, ranging from theoretical and foundational topics to applications and regulatory issues in various contexts.

Computer Security - ESORICS 2004 - 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September... Computer Security - ESORICS 2004 - 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings (Paperback, 2004 ed.)
Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
R1,768 Discovery Miles 17 680 Ships in 10 - 15 working days

ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13 15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty, and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the papers submitted, 27 were selected for presentation at the conference, giving an acceptance rate lower than 17%. The conference program also included an invited talk. A workshop like this does not just happen; it depends on the volunteer e?orts of ahostofindividuals. Thereisalonglistofpeoplewhovolunteeredtheirtimeand energy to put together the workshopand who deserve special thanks. Thanks to all the members of the program committee, and the external reviewers, for all their hardwork in the paper evaluation. Due to the large number of submissions the program committee members were really required to work hard in a short time frame, and we are very thankful to them for the commitment they showed with their active participation in the electronic discussion."

Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and... Research Directions in Data and Applications Security XVIII - IFIP TC11 / WG11.3 Eighteenth Annual Conference on Data and Applications Security July 25-28, 2004, Sitges, Catalonia, Spain (Hardcover, New edition)
Csilla Farkas, Pierangela Samarati
R3,209 Discovery Miles 32 090 Ships in 10 - 15 working days

As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.

Research Directions in Data and Applications Security XVIII presents original unpublished research results, practical experiences, and innovative ideas in the field of data and applications security and privacy. Topics presented in this volume include:
-Database theory;
-Inference control;
-Data protection techniques;
-Distributed systems;
-Access control models;
-Security policy;
-Design and management;
-Privacy;
-Network security.

This book is the eighteenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It contains twenty-three papers and two invited talks that were presented at the Eighteenth Annual IFIP WG 11.3 Conference on Data and Applications Security, which was sponsored by IFIP and held in Sitges, Catalonia, Spain in July 2004.

Research Directions in Data and Applications Security XVIII is a high-quality reference volume that addresses several aspects of information protection, and is aimed at researchers, educators, students, and developers.

Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May... Security and Privacy in the Age of Uncertainty - IFIP TC11 18th International Conference on Information Security (SEC2003) May 26-28, 2003, Athens, Greece (Hardcover, 2003 ed.)
Sabrina de Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas
R3,283 Discovery Miles 32 830 Ships in 10 - 15 working days

In light of the rapidly escalating age of uncertainty in the IT security and privacy world, this book provides the professional IT community and, in particular, security and data protection experts and researchers, with a selection of state-of-the-art material on emerging technologies for IT security and privacy issues. Furthermore, the book analyzes the new security threats and vulnerabilities that appear in modern information societies.

Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including:
*Secure Networks and Distributed Systems;
*Secure Multicast Communication and Secure Mobile Networks;
*Intrusion Prevention and Detection;
*Access Control Policies and Models;
*Security Protocols;
*Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.

Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)... Security of Data and Transaction Processing - A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000) (Hardcover, Reprinted from DISTRIBUTED AND PARALLEL DATABASES, 8:1, 2000)
Vijay Atluri, Pierangela Samarati
R3,046 Discovery Miles 30 460 Ships in 10 - 15 working days

Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area. Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field.

Database Security X - Status and prospects (Hardcover, 1997 ed.): Pierangela Samarati, Ravi Sandhu Database Security X - Status and prospects (Hardcover, 1997 ed.)
Pierangela Samarati, Ravi Sandhu
R4,686 Discovery Miles 46 860 Ships in 10 - 15 working days

The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their knowledge. The book brings together contributions from experts in the field throughout the world. Database security is still a key topic in mist businesses and in the public sector, having implications for the whole of society.

Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022,... Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings (Paperback, 1st ed. 2022)
Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati
R3,072 Discovery Miles 30 720 Ships in 10 - 15 working days

This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissions The papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.

From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Paperback, 1st ed.... From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday (Paperback, 1st ed. 2018)
Pierangela Samarati, Indrajit Ray, Indrakshi Ray
R1,622 Discovery Miles 16 220 Ships in 10 - 15 working days

This Festschrift is in honor of Sushil Jajodia, Professor in the George Mason University, USA, on the occasion of his 70th birthday. This book contains papers written in honor of Sushil Jajodia, of his vision and his achievements. Sushil has sustained a highly active research agenda spanning several important areas in computer security and privacy, and established himself as a leader in the security research community through unique scholarship and service. He has extraordinarily impacted the scientific and academic community, opening and pioneering new directions of research, and significantly influencing the research and development of security solutions worldwide. Also, his excellent record of research funding shows his commitment to sponsored research and the practical impact of his work. The research areas presented in this Festschrift include membrane computing, spiking neural networks, phylogenetic networks, ant colonies optimization, work bench for bio-computing, reaction systems, entropy of computation, rewriting systems, and insertion-deletion systems.

Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016,... Security and Trust Management - 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (Paperback, 1st ed. 2016)
Gilles Barthe, Evangelos Markatos, Pierangela Samarati
R2,244 Discovery Miles 22 440 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016. The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.

Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA,... Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings (Paperback, 2015 ed.)
Pierangela Samarati
R2,665 Discovery Miles 26 650 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 29th Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2015, held in Fairfax, VA, USA, in July 2015. The 18 revised full papers and 6 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.

Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected... Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Audun Josang, Pierangela Samarati, Marinella Petrocchi
R1,569 Discovery Miles 15 690 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Lucky Metal Cut Throat Razer Carrier
R30 R25 Discovery Miles 250
Baby Dove Rich Moisture Wipes (50Wipes)
R40 Discovery Miles 400
Kendall Office Chair (Green)
 (1)
R1,699 R899 Discovery Miles 8 990
Bostik Glue Stick Value Pack (3 x 25g)
R97 Discovery Miles 970
Nuovo All-In-One Car Seat (Black)
R3,599 R2,499 Discovery Miles 24 990
Fine Living E-Table (Black | White)
 (7)
R319 R199 Discovery Miles 1 990
Gloria
Sam Smith CD R238 R194 Discovery Miles 1 940
The End, So Far
Slipknot CD R498 Discovery Miles 4 980
JCB Drift Canvas Soft Toe Sneaker…
R389 Discovery Miles 3 890
Peptine Pro Equine Hydrolysed Collagen…
R699 R589 Discovery Miles 5 890

 

Partners