Data and Applications Security and Privacy XXXVII : 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings (Lecture Notes in Computer Science)

個数:

Data and Applications Security and Privacy XXXVII : 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 414 p.
  • 言語 ENG
  • 商品コード 9783031375859

Full Description

This volume LNCS 13942 constitutes the refereed proceedings of the 37th Annual IFIP WG 11.3 Conference, DBSec 2023, in Sophia-Antipolis, France, July 19-21, 2023.  The 19 full papers presented together with 5 short papers were carefully reviewed and selected from 56 submissions. The conference focuses on secure data sharing; access control and vulnerability assessment; machine learning; and mobile applications.

Contents

Privacy 1.- (Local) Differential Privacy has NO Disparate Impact on Fairness.- Building Quadtrees for Spatial Data under Local Differential Privacy.- Privacy-Preserving Genomic Statistical Analysis under Local Differential Privacy.- Secure Data Sharing.- New Results on Distributed Secret Sharing Protocols.- Probabilistic Fingerprinting Scheme for Correlated Data.- Optimized stream-cipher-based transciphering by means of functional-bootstrapping.- Applications 1.- Control is Nothing Without Trust: A First Look into Digital Identity Wallet Trends.-  Impact of using a privacy model on smart buildings data for CO2 prediction.- Digital Twins for IoT Security Management.- Privacy 2.- Distribution Invariant Local Differential Privacy For Federated Learning.- On the utility gain of iterative bayesian update for locally differentially private protocols.- Differentially Private Streaming Data Release under Temporal Correlations via Post-processing.- Access Control and Vulnerability Assessment.- Assurance, Consent and Access Control for Privacy-Aware OIDC Deployments.- Maintain High-Quality Access Control Policies: An Academic and Practice-Driven Approach.- SMET: Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity.- Machine Learning.- Classification Auto-Encoder based Detector against Diverse Data Poisoning Attacks.-  CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery.- An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning.- Mobile Applications.- Security and Privacy of Digital Mental Health: An Analysis of Web Services and Mobile Applications.- Android Code Vulnerabilities Early Detection using AI-powered ACVED Plugin.- A Dynamic Approach to Defuse Logic Bombs in Android Applications.- Applications 2.- AMOE: a Tool to Automatically Extract and Assess Organizational Evidence for Continuous Cloud Audit.- Essential Information from Vulnerability Descriptions for CVSS Evaluation.- Hybrid Consensus in Blockchain Protocols for correctness and Progress.

最近チェックした商品