MARC details
000 -LEADER |
fixed length control field |
05929nam a22004815i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114229.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150508s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319184678 |
Canceled/invalid ISBN |
978-3-319-18467-8 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-319-18467-8 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
|
Subject category code |
COM053000 |
Source |
bisacsh |
|
Subject category code |
UR |
Source |
thema |
|
Subject category code |
UTN |
Source |
thema005.8 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
245 10 - TITLE STATEMENT |
Title |
ICT Systems Security and Privacy Protection : |
Remainder of title |
30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / |
Statement of responsibility, etc. |
edited by Hannes Federrath, Dieter Gollmann. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham : |
Name of producer, publisher, distributor, manufacturer |
Springer International Publishing : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
490 0# - SERIES STATEMENT |
Series statement |
IFIP Advances in Information and Communication Technology, |
International Standard Serial Number |
1868-4238 ; |
Volume/sequential designation |
455 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
O-PSI: Delegated Private Set Intersection on Outsourced Datasets -- Flexible and Robust Privacy-Preserving Implicit Authentication -- Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack -- POSN: A Personal Online Social Network -- Verifying Observational Determinism -- Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing -- Enforcing Usage Constraints on Credentials for Web Applications -- A Survey of Alerting Websites: Risks and Solutions -- A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant -- Enhancing Passwords Security Using Deceptive Covert Communication -- Information Sharing and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems -- A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control -- Model-Driven Integration and Analysis of Access-Control Policies in Multi-layer Information Systems -- Authenticated File Broadcast Protocol -- Automated Classification of C&C Connections Through Malware URL Clustering -- B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications -- Security Management and Human Aspects of Security Investigation of Employee Security Behaviour: A Grounded Theory Approach -- Practice-Based Discourse Analysis of InfoSec Policies -- Understanding Collaborative Challenges in IT Security Preparedness Exercises -- Social Groupings and Information Security Obedience Within Organizations -- Attack Trees with Sequential Conjunction -- Enhancing the Security of Image CAPTCHAs Through Noise Addition -- SHRIFT System-Wide HybRid Information Flow Tracking -- ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries -- Exploit Generation for Information Flow Leaks in Object-Oriented Programs -- Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference -- Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach -- Integrity for Approximate Joins on Untrusted Computational Servers -- Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers -- Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment -- A Secure Exam Protocol Without Trusted Parties -- ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis -- Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases -- An Empirical Study on Android for Saving Non-shared Data on Public Storage -- The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation -- On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps -- A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration -- Cyber-physical Systems and Critical Infrastructures Security Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems -- Securing BACnet’s Pitfalls -- On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Information Systems. |
|
Topical term or geographic name entry element |
Computer Communication Networks. |
|
Topical term or geographic name entry element |
Data encryption (Computer science). |
|
Topical term or geographic name entry element |
Systems and Data Security. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
|
Topical term or geographic name entry element |
Management of Computing and Information Systems. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I24067 |
|
Topical term or geographic name entry element |
Computer Communication Networks. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I13022 |
|
Topical term or geographic name entry element |
Cryptology. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28020 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Federrath, Hannes. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
|
Personal name |
Gollmann, Dieter. |
Relator term |
editor. |
Relator code |
edt |
-- |
http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-319-18467-8">https://doi.org/10.1007/978-3-319-18467-8</a> |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
912 ## - |
-- |
ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |