| TÃtulo : |
36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Jøsang, Audun, ; Futcher, Lynn, ; Hagen, Janne, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XV, 448 p. 115 ilustraciones, 82 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-78120-0 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Entornos informáticos CriptologÃa Application software Cifrado de datos (Informática) Protección de datos CriptografÃa Ordenador |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 36.ª Conferencia Internacional IFIP TC 11 sobre Seguridad de la Información y Protección de la Privacidad, SEC 2021, celebrada en Oslo, Noruega, en junio de 2021.* Los 28 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados entre 112 presentaciones. Los artÃculos presentan investigaciones novedosas sobre aspectos teóricos y prácticos de la seguridad y la protección de la privacidad en los sistemas TIC. Están organizados en secciones temáticas sobre firmas digitales; gestión de vulnerabilidades; canales encubiertos y criptografÃa; seguridad de aplicaciones y sistemas; privacidad; Seguridad de la red; aprendizaje automático para seguridad; y gestión de seguridad. *La conferencia se realizó de manera virtual. |
| Nota de contenido: |
Digital Signatures -- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany -- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials -- SIUV: A Smart car Identity management and Usage control system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free-to-use Vulnerability Scanners – Revisited -- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection -- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware -- Covert Channels and Cryptography -- ESQABE: Predicting Encrypted Search Queries -- Reconnection-based Covert Channels in Wireless Networks -- Minecraft Altered Skin Channel (MASC) -- Lattice-based weak curve fault attack on ECDSA -- Application and System Security -- HyperSec: Visual Analytics for blockchain security monitoring -- 100 Popular Open-Source InfosecTools -- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators -- Privacy -- Accept All: The Landscape of Cookie Banners in Greece & the UK -- The AppChk Crowd-Sourcing Platform: Which third parties are iOS apps talking to? -- Compiling Personal Data and Subject Categories from App Data Models -- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App -- Perceived Privacy Problems within Digital Contact Tracing: A Study Among Swedish Citizens -- Network Security -- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC security -- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption -- Advanced Cowrie Configuration to Increase Honeypot Deceptiveness -- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-based Software Systems -- Machine Learning for Security -- TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning -- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles -- Revitalizing Self-Organizing Map: Anomaly Detection using Forecasting Error Patterns -- Security Management -- What is lurking in your backups? -- How Do Users Chain Email Accounts Together? -- Tensions that hinder the implementation of digital. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings [documento electrónico] / Jøsang, Audun, ; Futcher, Lynn, ; Hagen, Janne, . - 1 ed. . - [s.l.] : Springer, 2021 . - XV, 448 p. 115 ilustraciones, 82 ilustraciones en color. ISBN : 978-3-030-78120-0 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Aplicaciones informáticas y de sistemas de información Seguridad de datos e información Entornos informáticos CriptologÃa Application software Cifrado de datos (Informática) Protección de datos CriptografÃa Ordenador |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la 36.ª Conferencia Internacional IFIP TC 11 sobre Seguridad de la Información y Protección de la Privacidad, SEC 2021, celebrada en Oslo, Noruega, en junio de 2021.* Los 28 artÃculos completos presentados fueron cuidadosamente revisados ​​y seleccionados entre 112 presentaciones. Los artÃculos presentan investigaciones novedosas sobre aspectos teóricos y prácticos de la seguridad y la protección de la privacidad en los sistemas TIC. Están organizados en secciones temáticas sobre firmas digitales; gestión de vulnerabilidades; canales encubiertos y criptografÃa; seguridad de aplicaciones y sistemas; privacidad; Seguridad de la red; aprendizaje automático para seguridad; y gestión de seguridad. *La conferencia se realizó de manera virtual. |
| Nota de contenido: |
Digital Signatures -- XML Signature Wrapping Still Considered Harmful: A Case Study on the Personal Health Record in Germany -- Trust Me If You Can: Trusted Transformation Between (JSON) Schemas to Support Global Authentication of Education Credentials -- SIUV: A Smart car Identity management and Usage control system based on Verifiable credentials -- Vulnerability Management -- A Performance Assessment of Free-to-use Vulnerability Scanners – Revisited -- QuickBCC: Quick and Scalable Binary Vulnerable Code Clone Detection -- Automatic Inference of Taint Sources to Discover Vulnerabilities in SOHO Router Firmware -- Covert Channels and Cryptography -- ESQABE: Predicting Encrypted Search Queries -- Reconnection-based Covert Channels in Wireless Networks -- Minecraft Altered Skin Channel (MASC) -- Lattice-based weak curve fault attack on ECDSA -- Application and System Security -- HyperSec: Visual Analytics for blockchain security monitoring -- 100 Popular Open-Source InfosecTools -- RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administrators -- Privacy -- Accept All: The Landscape of Cookie Banners in Greece & the UK -- The AppChk Crowd-Sourcing Platform: Which third parties are iOS apps talking to? -- Compiling Personal Data and Subject Categories from App Data Models -- Privacy Concerns Go Hand in Hand with Lack of Knowledge: The Case of the German Corona-Warn-App -- Perceived Privacy Problems within Digital Contact Tracing: A Study Among Swedish Citizens -- Network Security -- Secure and Scalable IoT: An IoT Network Platform Based on Network Overlay and MAC security -- Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption -- Advanced Cowrie Configuration to Increase Honeypot Deceptiveness -- Less is Often More: Header Whitelisting as Semantic Gap Mitigation in HTTP-based Software Systems -- Machine Learning for Security -- TAR: Generalized Forensic Framework to Detect Deepfakes using Weakly Supervised Learning -- Anomaly Detection for Insider Threats: An Objective Comparison of Machine Learning Models and Ensembles -- Revitalizing Self-Organizing Map: Anomaly Detection using Forecasting Error Patterns -- Security Management -- What is lurking in your backups? -- How Do Users Chain Email Accounts Together? -- Tensions that hinder the implementation of digital. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |