Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings

Author:   Anna Lisa Ferrara ,  Ram Krishnan
Publisher:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   14901
ISBN:  

9783031651717


Pages:   342
Publication Date:   13 July 2024
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $237.57 Quantity:  
Add to Cart

Share |

Data and Applications Security and Privacy XXXVIII: 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings


Add your own review!

Overview

This book constitutes the proceedings from the 38th Annual IFIP 11.3 Conference on Data and Applications Security and Privacy XXXVIII, DBSec 2024, held in San Jose, CA, USA, during July 15–17, 2024. The 14 full papers and 6 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in the following topical sections: access control; crypto application; privacy; attack; ml attack, vulnerability; security user studies; and differential privacy.

Full Product Details

Author:   Anna Lisa Ferrara ,  Ram Krishnan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2024 ed.
Volume:   14901
ISBN:  

9783031651717


ISBN 10:   3031651715
Pages:   342
Publication Date:   13 July 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

.- Access Control. .- A Graph-based Framework for ABAC Policy Enforcement and Analysis. .- Human Digital Twins: Efficient Privacy-Preserving Access Control Through Views Pre-Materialisation. .- IAM Meets CTI: Make Identity and Access Management ready for Cyber Threat Intelligence. .- Crypto Application. .- SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. .- Ensuring End-to-End IoT Data Security & Privacy through Cloud-Enhanced Confidential Computing. .- Towards Atomicity and Composability in Cross-Chain NFTs. .- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM. .- Privacy. .- DT-Anon: Decision Tree Target-Driven Anonymization. .- Visor: Privacy-preserving Reputation for Decentralized Marketplaces. .- Attack. .- Resiliency Analysis of Mission-critical System of Systems Using Formal Methods. .- Enhancing EV Charging Station Security Using A Multi-dimensional Dataset : CICEVSE2024. .- Optimal Automated Generation of Playbooks. .- ML Attack, Vulnerablity. .- ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. .- VulPrompt: Prompt-based Vulnerability Detection using Few-shot Graph Learning. .- All Your LLMs Belong To Us: Experiments with a New Extortion Phishing Dataset. .- Adaptive Image Adversarial Example Detection Based on Class Activation Mapping. .- Security User Studies. .- From Play to Profession: A Serious Game to Raise Awareness on Digital Forensics. .- User Perception of CAPTCHAs: A Comparative Study between University and Internet Users. .- Differential Privacy. .- Incentivized Federated Learning with Local Differential Privacy using Permissioned Blockchains. .- Does Differential Privacy Prevent Backdoor Attacks in Practice?.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List