This volume gathers the papers presented at three workshops that are embedded in the IFIP Sec Con...
Security is probably the most critical factor for the development of the 'Information Society'. E...
InhaltsangabePrivacy.- Access control.- Cloud computing.- Data outsourcing.- Mobile computing.
This Springer Brief examines the tools based on attack graphs that help reveal network hardening ...
This book comprehensively presents a novel approach to the systematic security hardening of softw...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa...
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analy...
Introduction.- Related Work.- Data Publishing: Trading off Privacy with Utility through the k-Jum...
Reviews a range of network security models that focus on combining individual metric scores obtai...
SiMLA - Security in Machine Learning and its Applications.- Risk-based Static Authentication in W...
This book provides a comprehensive review of the most up to date research related to cloud securi...
1 Introduction.- 2 Binary Analysis Overview.- 3 Compiler Provenance Attribution.- 4 Library Funct...