{"title":"Comprehensive Security Assurance Measures for Virtualized Server Environments","authors":"R. Chandramouli","doi":"10.1007/978-3-030-04834-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_3","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced Biometric Technologies: Emerging Scenarios and Research Trends","authors":"A. Genovese, E. M. Ballester, V. Piuri, F. Scotti","doi":"10.1007/978-3-030-04834-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_17","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Vimercati, S. Foresti, S. Paraboschi, Gerardo Pelosi, P. Samarati
{"title":"Access Privacy in the Cloud","authors":"S. Vimercati, S. Foresti, S. Paraboschi, Gerardo Pelosi, P. Samarati","doi":"10.1007/978-3-030-04834-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_10","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131767181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati
{"title":"Supporting Users in Cloud Plan Selection","authors":"S. Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati","doi":"10.1007/978-3-030-04834-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_13","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization Technologies and Cloud Security: advantages, issues, and perspectives","authors":"R. D. Pietro, F. Lombardi","doi":"10.1007/978-3-030-04834-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_9","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"28 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115432544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Enrico Bacis, S. Vimercati, S. Foresti, S. Paraboschi, Marco Rosa, P. Samarati
{"title":"Protecting Resources and Regulating Access in Cloud-Based Object Storage","authors":"Enrico Bacis, S. Vimercati, S. Foresti, S. Paraboschi, Marco Rosa, P. Samarati","doi":"10.1007/978-3-030-04834-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_7","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saptarshi Das, Barsha Mitra, V. Atluri, Jaideep Vaidya, S. Sural
{"title":"Policy Engineering in RBAC and ABAC","authors":"Saptarshi Das, Barsha Mitra, V. Atluri, Jaideep Vaidya, S. Sural","doi":"10.1007/978-3-030-04834-1_2","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_2","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shang Li, Srijan Kumar, T. Dumitras, V. S. Subrahmanian
{"title":"Breaking Bad: Forecasting Adversarial Android Bad Behavior","authors":"Shang Li, Srijan Kumar, T. Dumitras, V. S. Subrahmanian","doi":"10.1007/978-3-030-04834-1_20","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_20","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132175392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}