Description |
1 online resource (ix, 278 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 9331 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 9331. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Contents -- Security Metrics and Classification -- Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns -- 1 Introduction -- 2 Related Work -- 3 Digital Waste Sorting -- 3.1 Definition of Classes -- 3.2 Feature Extraction -- 3.3 DWS Classification Workflow -- 4 Results -- 4.1 Classifier Selection -- 4.2 DWS Application -- 5 Conclusion and Future Directions -- References -- Integrating Privacy and Safety Criteria into Planning Tasks -- 1 Introduction -- 2 Related Work -- 3 Approach -- 4 The Analytic Hierarchy Process |
|
4.1 AHP Hierarchy -- 4.2 Relative Importance of Criteria -- 4.3 Ranking of Alternative Plans -- 5 Criteria -- 5.1 Utility -- 5.2 Unsatisfied Safety Preferences (USP) -- 5.3 Willingness-to-Share-Data (WSD) -- 6 The Influence of Criteria Importance Ratios -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments -- 1 Introduction -- 2 Background and Related Work -- 2.1 Terminology -- 2.2 Related Work -- 3 Threat Model -- 4 Operational Measurement Trust -- 4.1 Trusted Monitoring Base |
|
4.2 Secure Elements and Measurement Data -- 5 Levels of Operational Trust -- 5.1 Trusted Monitoring Base -- 5.2 Probes -- 5.3 Quantifying Overall Confidence -- 6 Operational Measurement Trust and Security Metrics -- 7 Discussion -- 8 Conclusion -- References -- Data Protection -- A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies -- 1 Introduction -- 2 Running Example -- 3 A Declarative Framework for Purpose-Aware Policies -- 3.1 Semantics of Purpose-Aware Policies -- 4 Policies Verification -- 4.1 Purpose Achievement Problem -- 4.2 Runtime Policies Verification |
|
5 Discussion and Related Work -- References -- How to Trust the Re-use of Data -- 1 Introduction -- 2 Klaim with Goals -- 2.1 Syntax -- 2.2 Semantics -- 3 Analysis -- 3.1 Over Approximation -- 3.2 Well-Behaved Processes -- 4 Conclusion -- A Appendix: Proofs -- References -- Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business -- 1 Personal Data Markets and Privacy -- 2 Related Work -- 3 Principal-Agent Model of the Privacy Problems in Data-Centric Business -- 3.1 Assumptions and Background -- 3.2 Principal-Agent Model |
|
4 Towards Balancing Privacy and Efficiency -- 4.1 S1: Privacy is Not Considered a Competitive Factor by Users -- 4.2 S3: Markets for Data-Centric Services Are Currently Monopolistic -- 4.3 S2: Privacy is Perceived as a Competitive Factor by Users But They are Unable to Determine Providers' Level of ̀̀Privacy-Friendliness'' -- 5 Conclusion -- References -- Intrusion Detection and Software Vulnerabilities -- The AC-Index: Fast Online Detection of Correlated Alerts -- 1 Introduction -- 2 Preliminaries and Problem Formalization -- 3 The AC-Index -- 4 Experimental Results -- 5 Related Work |
Summary |
This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015. The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability |
Notes |
International conference proceedings |
|
Includes author index |
|
English |
|
Online resource; title from PDF title page (SpringerLink, viewed September 24, 2015) |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Information architecture.
|
|
Coding theory & cryptology.
|
|
Algorithms & data structures.
|
|
Ethical & social aspects of IT.
|
|
Computer security.
|
|
Business & Economics -- Information Management.
|
|
Computers -- Security -- General.
|
|
Computers -- Programming -- Algorithms.
|
|
Computers -- Social Aspects -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Foresti, Sara, editor
|
ISBN |
9783319248585 |
|
3319248588 |