Data and Applications Security and Privacy XXXVIII : 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings (Lecture Notes in Computer Science) (2024)

個数:

Data and Applications Security and Privacy XXXVIII : 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings (Lecture Notes in Computer Science) (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 342 p.
  • 商品コード 9783031651717

Full Description

This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15-17, 2024.

The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.

Contents

.- Access Control.

.- A Graph-based Framework for ABAC Policy Enforcement and Analysis.

.- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation.

.- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence.

.- Crypto Application.

.- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.

.- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing.

.- Towards Atomicity and Composability in Cross-Chain NFTs.

.- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM.

.- Privacy.

.- DT-Anon: Decision Tree Target-Driven Anonymization.

.- Visor: Privacy-preserving Reputation for Decentralized Marketplaces.

.- Attack.

.- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods.

.- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024.

.- Optimal Automated Generation of Playbooks.

.- ML Attack, Vulnerablity.

.- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.

.- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning.

.- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset.

.- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping.

.- Security User Studies.

.- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics.

.- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users.

.- Differential Privacy.

.- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains.

.- Does Differential Privacy Prevent Backdoor Attacks in Practice?.

最近チェックした商品