From Database to Cyber Security最新文献

筛选
英文 中文
Comprehensive Security Assurance Measures for Virtualized Server Environments 虚拟化服务器环境综合安全保障措施
From Database to Cyber Security Pub Date : 2018-12-07 DOI: 10.1007/978-3-030-04834-1_3
R. Chandramouli
{"title":"Comprehensive Security Assurance Measures for Virtualized Server Environments","authors":"R. Chandramouli","doi":"10.1007/978-3-030-04834-1_3","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_3","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126895676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Biometric Technologies: Emerging Scenarios and Research Trends 先进生物识别技术:新兴场景和研究趋势
From Database to Cyber Security Pub Date : 2018-11-30 DOI: 10.1007/978-3-030-04834-1_17
A. Genovese, E. M. Ballester, V. Piuri, F. Scotti
{"title":"Advanced Biometric Technologies: Emerging Scenarios and Research Trends","authors":"A. Genovese, E. M. Ballester, V. Piuri, F. Scotti","doi":"10.1007/978-3-030-04834-1_17","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_17","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127853807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access Privacy in the Cloud 访问云中的隐私
From Database to Cyber Security Pub Date : 2018-11-30 DOI: 10.1007/978-3-030-04834-1_10
S. Vimercati, S. Foresti, S. Paraboschi, Gerardo Pelosi, P. Samarati
{"title":"Access Privacy in the Cloud","authors":"S. Vimercati, S. Foresti, S. Paraboschi, Gerardo Pelosi, P. Samarati","doi":"10.1007/978-3-030-04834-1_10","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_10","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131767181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting Users in Cloud Plan Selection 支持云计划选择中的用户
From Database to Cyber Security Pub Date : 2018-11-01 DOI: 10.1007/978-3-030-04834-1_13
S. Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati
{"title":"Supporting Users in Cloud Plan Selection","authors":"S. Vimercati, S. Foresti, G. Livraga, V. Piuri, P. Samarati","doi":"10.1007/978-3-030-04834-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_13","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Virtualization Technologies and Cloud Security: advantages, issues, and perspectives 虚拟化技术和云安全:优势、问题和前景
From Database to Cyber Security Pub Date : 2018-07-29 DOI: 10.1007/978-3-030-04834-1_9
R. D. Pietro, F. Lombardi
{"title":"Virtualization Technologies and Cloud Security: advantages, issues, and perspectives","authors":"R. D. Pietro, F. Lombardi","doi":"10.1007/978-3-030-04834-1_9","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_9","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"28 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115432544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Protecting Resources and Regulating Access in Cloud-Based Object Storage 基于云对象存储的资源保护与访问调节
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_7
Enrico Bacis, S. Vimercati, S. Foresti, S. Paraboschi, Marco Rosa, P. Samarati
{"title":"Protecting Resources and Regulating Access in Cloud-Based Object Storage","authors":"Enrico Bacis, S. Vimercati, S. Foresti, S. Paraboschi, Marco Rosa, P. Samarati","doi":"10.1007/978-3-030-04834-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_7","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129466062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Graph Approaches to Network Security Analytics 网络安全分析的图方法综述
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_16
S. Noel
{"title":"A Review of Graph Approaches to Network Security Analytics","authors":"S. Noel","doi":"10.1007/978-3-030-04834-1_16","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_16","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132059080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Distributed Services Attestation in IoT 物联网中的分布式服务认证
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_14
M. Conti, Edlira Dushku, L. Mancini
{"title":"Distributed Services Attestation in IoT","authors":"M. Conti, Edlira Dushku, L. Mancini","doi":"10.1007/978-3-030-04834-1_14","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_14","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133735339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Policy Engineering in RBAC and ABAC RBAC和ABAC中的策略工程
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_2
Saptarshi Das, Barsha Mitra, V. Atluri, Jaideep Vaidya, S. Sural
{"title":"Policy Engineering in RBAC and ABAC","authors":"Saptarshi Das, Barsha Mitra, V. Atluri, Jaideep Vaidya, S. Sural","doi":"10.1007/978-3-030-04834-1_2","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_2","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130194550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Breaking Bad: Forecasting Adversarial Android Bad Behavior 《绝命毒师》:预测Android的敌对行为
From Database to Cyber Security Pub Date : 1900-01-01 DOI: 10.1007/978-3-030-04834-1_20
Shang Li, Srijan Kumar, T. Dumitras, V. S. Subrahmanian
{"title":"Breaking Bad: Forecasting Adversarial Android Bad Behavior","authors":"Shang Li, Srijan Kumar, T. Dumitras, V. S. Subrahmanian","doi":"10.1007/978-3-030-04834-1_20","DOIUrl":"https://doi.org/10.1007/978-3-030-04834-1_20","url":null,"abstract":"","PeriodicalId":340669,"journal":{"name":"From Database to Cyber Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132175392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信