Cyber Security and Privacy EU Forum最新文献

筛选
英文 中文
Security and Privacy in Vehicular Communications with INTER-TRUST 基于互信任的车辆通信的安全性和隐私性
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_5
J. M. M. Pérez, Antonio Moragón Juan, Jaime Arrazola Pérez, J. Rabadán, A. Gómez-Skarmeta
{"title":"Security and Privacy in Vehicular Communications with INTER-TRUST","authors":"J. M. M. Pérez, Antonio Moragón Juan, Jaime Arrazola Pérez, J. Rabadán, A. Gómez-Skarmeta","doi":"10.1007/978-3-319-25360-2_5","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_5","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123786478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards the Dynamic Provision of Virtualized Security Services 面向动态提供虚拟化安全服务
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_6
C. Basile, Christian Pitscheider, Fulvio Risso, Fulvio Valenza, Marco Vallini
{"title":"Towards the Dynamic Provision of Virtualized Security Services","authors":"C. Basile, Christian Pitscheider, Fulvio Risso, Fulvio Valenza, Marco Vallini","doi":"10.1007/978-3-319-25360-2_6","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_6","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117085484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Implementing Privacy Policies in the Cloud 在云中实施隐私政策
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_1
Claudio Caimi, Michela D'Errico, C. Gambardella, Mirko Manea, N. Wainwright
{"title":"Implementing Privacy Policies in the Cloud","authors":"Claudio Caimi, Michela D'Errico, C. Gambardella, Mirko Manea, N. Wainwright","doi":"10.1007/978-3-319-25360-2_1","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_1","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114787367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medusa: A Supply Chain Risk Assessment Methodology 美杜莎:供应链风险评估方法
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_7
Nineta Polemi, P. Kotzanikolaou
{"title":"Medusa: A Supply Chain Risk Assessment Methodology","authors":"Nineta Polemi, P. Kotzanikolaou","doi":"10.1007/978-3-319-25360-2_7","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_7","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
What's so Unique about Cyber Security? 网络安全有什么独特之处?
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_11
Kenny Doyle, Zeta Dooly, Paul Kearney
{"title":"What's so Unique about Cyber Security?","authors":"Kenny Doyle, Zeta Dooly, Paul Kearney","doi":"10.1007/978-3-319-25360-2_11","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_11","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123154678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Trust Problem in Modern Network Infrastructures 现代网络基础设施中的信任问题
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_10
Ludovic Jacquin, A. Lioy, D. López, A. Shaw, Tao Su
{"title":"The Trust Problem in Modern Network Infrastructures","authors":"Ludovic Jacquin, A. Lioy, D. López, A. Shaw, Tao Su","doi":"10.1007/978-3-319-25360-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_10","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121378021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security and Business Situational Awareness 安全和业务态势感知
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_9
R. Rieke, M. Zhdanova, J. Repp
{"title":"Security and Business Situational Awareness","authors":"R. Rieke, M. Zhdanova, J. Repp","doi":"10.1007/978-3-319-25360-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_9","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124113349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-World Post-Quantum Digital Signatures 真实世界的后量子数字签名
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_4
Denis Butin, S. Gazdag, J. Buchmann
{"title":"Real-World Post-Quantum Digital Signatures","authors":"Denis Butin, S. Gazdag, J. Buchmann","doi":"10.1007/978-3-319-25360-2_4","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_4","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115307581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development 基于受控软件开发的基于证据的互联网服务可信度研究
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_8
Francesco Di Cerbo, N. Mohammadi, Sachar Paulus
{"title":"Evidence-Based Trustworthiness of Internet-Based Services Through Controlled Software Development","authors":"Francesco Di Cerbo, N. Mohammadi, Sachar Paulus","doi":"10.1007/978-3-319-25360-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_8","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123547994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO 揭露隐私和网络安全组织的创新实践和要求:来自IPACSO的见解
Cyber Security and Privacy EU Forum Pub Date : 2015-04-28 DOI: 10.1007/978-3-319-25360-2_12
Zeta Dooly, Kenny Doyle, Jamie Power
{"title":"Uncovering Innovation Practices and Requirements in Privacy and Cyber Security Organisations: Insights from IPACSO","authors":"Zeta Dooly, Kenny Doyle, Jamie Power","doi":"10.1007/978-3-319-25360-2_12","DOIUrl":"https://doi.org/10.1007/978-3-319-25360-2_12","url":null,"abstract":"","PeriodicalId":282439,"journal":{"name":"Cyber Security and Privacy EU Forum","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117307537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信