Risks and Security of Internet and Systems : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Risks and Security of Internet and Systems : 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 307 p.
  • 商品コード 9783319318103

Full Description

This book constitutes the thoroughly refereed
post-conference proceedings of the 10th International Conference on Risks and
Security of Internet Systems, CRiSIS 2015, held in Mytilene, Lesbos Island,
Greece, in July 2015.

The 18 full papers presented were selected from 50 submissions.
The papers sessions that have covered a broad range of topics: trust and privacy
issues, privacy policies and policy based protocols, risk management, risk
analysis and vulnerability assessment, cloud systems and cryptography, and
attack and security measures.

Contents

Addressing Privacy and
Trust Issues in Cultural Heritage Modelling.- An Ontology Regulating Privacy
Oriented Access Controls.- A Literature Survey and Classifications on Data
Deanonymisation.- Improving Users' Trust through Friendly Privacy Policies: An Empirical
Study.- MPLS Policy Target Recognition Network.- Context aware Intrusion Response
Based on Argumentation Logic.- Countermeasure Selection Based on the Attack and
Service Dependency Graphs for Security Incident Management.- Quantitative Risk,
Statistical Methods and the Four Quadrants for Information Security.- Exploring
a Controls-Based Assessment of Infrastructure Vulnerability.- Quantifying Security
in Web ETL Processes.- A Meta-Model for Assisting a Cloud Forensics Process.- POR-2P:
Network Coding-Based POR for Data Provision-Payment System.- A Single Key
Scheduling Based Compression Function.- Security Issue of Wireless HART Based
SCADA Systems.- Attack Volume Model: Geometrical Approach and Application.- An Intensive
Analysis of Security and Privacy Browser Add-Ons.- MBotCS: A mobile Botnet Detection
System Based on Machine Learning.- Toward Securing MANET against the Energy
Depletion Attack. 

最近チェックした商品