Search results: Found 12

Listing 1 - 10 of 12 << page
of 2
>>
Sort by
Cyber Security

Authors: --- --- --- --- et al.
Book Series: Communications in Computer and Information Science ISBN: 9789811366215 Year: Pages: 177 DOI: 10.1007/978-981-13-6621-5 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-01-29 11:21:04
License:

Loading...
Export citation

Choose an application

Abstract

This open access book constitutes the refereed proceedings of the 15th International Annual Conference on Cyber Security, CNCERT 2018, held in Beijing, China, in August 2018. The 14 full papers presented were carefully reviewed and selected from 53 submissions. The papers cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat intelligence analysis, vulnerability, artificial intelligence security, IPv6 risk research, cybersecurity policy and regulation research, big data analysis and industrial security.

Digital Identity: an emergent legal concept

Author:
ISBN: 9780980723007 Year: Pages: 178 DOI: 10.1017/UPO9780980723007 Language: English
Publisher: University of Adelaide Press
Subject: Law
Added to DOAB on : 2012-05-11 07:57:22
License: University of Adelaide Press

Loading...
Export citation

Choose an application

Abstract

This is the first full-length study of digital identity in a transactional context, from a legal perspective. Clare Sullivan's analysis reveals the emergence of a distinct, new legal concept of identity. This concept is particularly clear under a national identity scheme such as the United Kingdom and Indian schemes. However, its emergence is evident even in jurisdictions, like Australia, which do not have a formal national identity scheme. Much of the analysis can also be extrapolated to proprietary schemes such as those run by banks and other businesses. An individual’s digital identity which is used for transactional purposes has crucial functions which give it legal personality. The author argues that an individual’s digital identity also has the characteristics of property which can, and should, be legally protected. Identity theft is defined using the emergent concept and the study shows that digital identity is property which capable of actually being stolen and criminally damaged. The study examines the emergence of attendant legal rights and duties including a new right to digital identity and its legal protection. Dr Sullivan argues that an individual has the right to an accurate, functional digital identity and shows that this right exists in addition to the right to privacy. Dr Sullivan maintains that, considering the essentially public nature of identity, the right to identity provides better, and more appropriate, protection than is afforded by the right to privacy. She asserts that the importance of the right to identity in this context has been obscured by the focus on privacy in international legal scholarship and jurisprudence. The functions and legal nature of digital identity are analysed using real examples which highlight the implications for individuals, businesses and government. The findings have the potential to fundamentally change the way digital identity is legally and commercially regarded.

Handbook of Vascular Biometrics

Authors: --- --- ---
Book Series: Advances in Computer Vision and Pattern Recognition ISBN: 9783030277314 Year: Pages: 533 DOI: 10.1007/978-3-030-27731-4 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-02-04 11:21:15
License:

Loading...
Export citation

Choose an application

Abstract

This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers.

The Ethics of Cybersecurity

Authors: --- ---
Book Series: The International Library of Ethics, Law and Technology ISBN: 9783030290535 Year: Pages: 384 DOI: 10.1007/978-3-030-29053-5 Language: English
Publisher: Springer Nature
Subject: Philosophy --- Social Sciences --- Law --- Computer Science
Added to DOAB on : 2020-02-12 11:21:03
License:

Loading...
Export citation

Choose an application

Abstract

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.

Principles of Security and Trust

Authors: ---
Book Series: Lecture Notes in Computer Science ISBN: 9783030171384 Year: Pages: 249 DOI: 10.1007/978-3-030-17138-4 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-01-29 11:21:11
License:

Loading...
Export citation

Choose an application

Abstract

This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems.

Demystifying Internet of Things Security

Authors: --- --- ---
ISBN: 9781484228968 Year: Pages: 488 DOI: 10.1007/978-1-4842-2896-8 Language: English
Publisher: Springer Nature
Subject: Business and Management --- Computer Science
Added to DOAB on : 2020-02-05 11:21:05
License:

Loading...
Export citation

Choose an application

Abstract

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Security Infrastructure Technology for Integrated Utilization of Big Data

Authors: ---
ISBN: 9789811536540 Year: Pages: 166 DOI: 10.1007/978-981-15-3654-0 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-05-14 09:30:37
License:

Loading...
Export citation

Choose an application

Abstract

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.

Rational Cybersecurity for Business

Author:
ISBN: 9781484259528 Year: Pages: 333 DOI: 10.1007/978-1-4842-5952-8 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-09-23 00:04:54
License:

Loading...
Export citation

Choose an application

Abstract

Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and motivate and retain your team. Misalignment between security and your business can start at the top at the C-suite or happen at the line of business, IT, development, or user level. It has a corrosive effect on any security project it touches. But it does not have to be like this. Author Dan Blum presents valuable lessons learned from interviews with over 70 security and business leaders. You will discover how to successfully solve issues related to: risk management, operational security, privacy protection, hybrid cloud management, security culture and user awareness, and communication challenges. This open access book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, control baseline, security culture, IT rationalization, access control, and cyber-resilience. Common challenges and good practices are provided for businesses of different types and sizes. And more than 50 specific keys to alignment are included. What You Will Learn Improve your security culture: clarify security-related roles, communicate effectively to businesspeople, and hire, motivate, or retain outstanding security staff by creating a sense of efficacy Develop a consistent accountability model, information risk taxonomy, and risk management framework Adopt a security and risk governance model consistent with your business structure or culture, manage policy, and optimize security budgeting within the larger business unit and CIO organization IT spend Tailor a control baseline to your organization’s maturity level, regulatory requirements, scale, circumstances, and critical assets Help CIOs, Chief Digital Officers, and other executives to develop an IT strategy for curating cloud solutions and reducing shadow IT, building up DevSecOps and Disciplined Agile, and more Balance access control and accountability approaches, leverage modern digital identity standards to improve digital relationships, and provide data governance and privacy-enhancing capabilities Plan for cyber-resilience: work with the SOC, IT, business groups, and external sources to coordinate incident response and to recover from outages and come back stronger Integrate your learnings from this book into a quick-hitting rational cybersecurity success plan Who This Book Is For Chief Information Security Officers (CISOs) and other heads of security, security directors and managers, security architects and project leads, and other team members providing security leadership to your business

The Coupling of Safety and Security

Authors: ---
Book Series: SpringerBriefs in Applied Sciences and Technology; SpringerBriefs in Safety Management ISBN: 9783030472290 Year: Pages: 113 DOI: 10.1007/978-3-030-47229-0 Language: English
Publisher: Springer Nature
Subject: Agriculture (General) --- Computer Science --- Social Sciences --- Economics
Added to DOAB on : 2020-09-23 00:03:04
License:

Loading...
Export citation

Choose an application

Abstract

This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.

International Symposium on Mathematics, Quantum Theory, and Cryptography

Authors: --- --- --- --- et al.
Book Series: Mathematics for Industry ISBN: 9789811551918 Year: Pages: 274 DOI: 10.1007/978-981-15-5191-8 Language: English
Publisher: Springer Nature
Subject: Agriculture (General) --- Computer Science
Added to DOAB on : 2020-11-19 00:18:33
License:

Loading...
Export citation

Choose an application

Abstract

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by
Narrow your search

Publisher

Springer Nature (11)

University of Adelaide Press (1)


License

CC by (11)

University of Adelaide Press (1)


Language

english (12)


Year
From To Submit

2021 (2)

2020 (7)

2019 (2)

2011 (1)