Foundations and Practice of Security

Foundations and Practice of Security

10th International Symposium, FPS 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers

Garcia-Alfaro, Joaquin; Imine, Abdessamad; Marion, Jean-Yves; Logrippo, Luigi; Fernandez, Jose M.

Springer International Publishing AG

02/2018

319

Mole

Inglês

9783319756493

15 a 20 dias

516

Descrição não disponível.
Access Control.- Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.- Relationship-Based Access Control for Resharing in Decentralized Online Social Networks.- Secure Protocol of ABAC Certificates Revocation and Delegation.- Formal Verification.- Formal Analysis of Combinations of Secure Protocols.- Formal Analysis of the Fido 1.x Protocol.- Position Paper: A Roadmap for High Assurance Cryptography.- Privacy.- Privacy-preserving Equality Test towards Big Data.- Multi-level access control, partial orders and directed graphs in access control for secrecy and privacy.- Physical Security.- Generation of Applicative Attacks Scenarios Against Industrial Systems.- HuMa: A multi-layer framework for threat analysis in a heterogeneous log environment.- Monitoring of Security Properties Using BeepBeep.- Network Security, Encrypted DBs and Blockchain.- More Lightweight, yet Stronger 802.15.4 Security through an Intra-Layer Optimization.- ObliviousDB: Practicaland Efficient Searchable Encryption with Controllable Leakage.- Ethereum: state of knowledge and research perspectives.- Vulnerability Analysis and Deception Systems.- Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics.- Extinguishing Ransomware - a Hybrid Approach to Android Ransomware Detection.- Deception in Information Security: Legal Considerations in the Context of German and European Law.- Defence Against Attacks and Anonymity.- SATYA: Defending against Adversarial Attacks using Statistical Hypothesis Testing.- Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric.- Weighted Factors for Evaluating Anonymity.
access control;artificial intelligence;authentication;computer crime;computer networks;computer operating systems;cryptography;data privacy;data security;encryption;graph theory;internet;privacy;semantics;telecommunication networks;intrusion detection;network security