| TÃtulo : |
Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2017 |
| Número de páginas: |
XVI, 855 p. 314 ilustraciones |
| ISBN/ISSN/DL: |
978-3-319-72395-2 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Inteligencia artificial Seguridad de datos e información Redes de comunicación informática CriptologÃa IngenierÃa Informática y Redes |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de 11 simposios y talleres celebrados en la Décima Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. El total de 75 artÃculos presentados en este volumen fue cuidadosamente revisado y seleccionado de un total de 190 presentaciones a todos los talleres: UbiSafe 2017: El 9º Simposio Internacional IEEE sobre Computación UbiSafe ISSR 2017: El 9º Taller Internacional IEEE sobre Seguridad en e-Ciencia y e-Research TrustData 2017: El 8º Taller Internacional sobre Confianza, Seguridad y Privacidad para Big Data TSP 2017: El 7º Simposio Internacional sobre Confianza, Seguridad y Privacidad para Aplicaciones Emergentes SPIoT 2017: El 6º Simposio Internacional sobre Seguridad y Privacidad en Internet de las Cosas NOPE 2017: El 5º Simposio Internacional Taller sobre optimización de redes y evaluación del rendimiento DependSys 2017: Tercer simposio internacional sobre confiabilidad en sistemas y aplicaciones de sensores, nube y big data SCS 2017: Tercer simposio internacional sobre sistemas de sensores-nube WCSSC 2017: Segundo taller internacional sobre servicios de almacenamiento en la nube and Computing MSCF 2017: El primer simposio internacional sobre seguridad multimedia y ciencia forense digital SPBD 2017: El simposio internacional de 2017 sobre Big Data y aprendizaje automático en seguridad de la información, privacidad y anonimato. |
| Nota de contenido: |
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self – similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability – Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings [documento electrónico] / Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVI, 855 p. 314 ilustraciones. ISBN : 978-3-319-72395-2 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Red de computadoras CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Inteligencia artificial Seguridad de datos e información Redes de comunicación informática CriptologÃa IngenierÃa Informática y Redes |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de 11 simposios y talleres celebrados en la Décima Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. El total de 75 artÃculos presentados en este volumen fue cuidadosamente revisado y seleccionado de un total de 190 presentaciones a todos los talleres: UbiSafe 2017: El 9º Simposio Internacional IEEE sobre Computación UbiSafe ISSR 2017: El 9º Taller Internacional IEEE sobre Seguridad en e-Ciencia y e-Research TrustData 2017: El 8º Taller Internacional sobre Confianza, Seguridad y Privacidad para Big Data TSP 2017: El 7º Simposio Internacional sobre Confianza, Seguridad y Privacidad para Aplicaciones Emergentes SPIoT 2017: El 6º Simposio Internacional sobre Seguridad y Privacidad en Internet de las Cosas NOPE 2017: El 5º Simposio Internacional Taller sobre optimización de redes y evaluación del rendimiento DependSys 2017: Tercer simposio internacional sobre confiabilidad en sistemas y aplicaciones de sensores, nube y big data SCS 2017: Tercer simposio internacional sobre sistemas de sensores-nube WCSSC 2017: Segundo taller internacional sobre servicios de almacenamiento en la nube and Computing MSCF 2017: El primer simposio internacional sobre seguridad multimedia y ciencia forense digital SPBD 2017: El simposio internacional de 2017 sobre Big Data y aprendizaje automático en seguridad de la información, privacidad y anonimato. |
| Nota de contenido: |
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self – similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability – Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |