Search results: Found 5

Listing 1 - 5 of 5
Sort by
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings

Authors: --- --- ---
Book Series: Lecture Notes in Computer Science ISSN: 0302-9743 / 1611-3349 ISBN: 9783319607733 9783319607740 Year: Pages: 192 DOI: https://doi.org/10.1007/978-3-319-60774-0 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2017-11-24 15:59:08
License:

Loading...
Export citation

Choose an application

Abstract

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.

Security Infrastructure Technology for Integrated Utilization of Big Data

Authors: ---
ISBN: 9789811536540 Year: Pages: 166 DOI: 10.1007/978-981-15-3654-0 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-05-14 09:30:37
License:

Loading...
Export citation

Choose an application

Abstract

This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especially focuses on cryptographic primitives and privacy-preserving techniques, which are essential prerequisites. The book also covers elliptic curve cryptosystems, which offer compact public key cryptosystems; and LWE-based cryptosystems, which are a type of post-quantum cryptosystem. Since big data distribution platforms require appropriate data handling, the book also describes a privacy-preserving data integration protocol and privacy-preserving classification protocol for secure computation. Furthermore, it introduces an anonymization technique and privacy risk evaluation technique. This book also describes the latest related findings in both the living safety and medical fields. In the living safety field, to prevent injuries occurring in everyday life, it is necessary to analyze injury data, find problems, and implement suitable measures. But most cases don’t include enough information for injury prevention because the necessary data is spread across multiple organizations, and data integration is difficult from a security standpoint. This book introduces a system for solving this problem by applying a method for integrating distributed data securely and introduces applications concerning childhood injury at home and school injury. In the medical field, privacy protection and patient consent management are crucial for all research. The book describes a medical test bed for the secure collection and analysis of electronic medical records distributed among various medical institutions. The system promotes big-data analysis of medical data with a cloud infrastructure and includes various security measures developed in our project to avoid privacy violations.

International Symposium on Mathematics, Quantum Theory, and Cryptography

Authors: --- --- --- --- et al.
Book Series: Mathematics for Industry ISBN: 9789811551918 Year: Pages: 274 DOI: 10.1007/978-981-15-5191-8 Language: English
Publisher: Springer Nature
Subject: Agriculture (General) --- Computer Science
Added to DOAB on : 2020-11-19 00:18:33
License:

Loading...
Export citation

Choose an application

Abstract

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

GDPR and Biobanking

Authors: --- ---
Book Series: Law, Governance and Technology Series ISBN: 9783030493882 Year: Pages: 434 DOI: 10.1007/978-3-030-49388-2 Language: English
Publisher: Springer Nature
Subject: Law --- Computer Science --- Medicine (General)
Added to DOAB on : 2021-01-15 00:49:51
License:

Loading...
Export citation

Choose an application

Abstract

This open access book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective research collaboration. The General Data Protection Regulation (GDPR) has established stringent requirements for the processing of health and genetic data, while simultaneously allowing considerable multi-level exceptions for the purposes of scientific research. In addition to directly applicable exceptions, the GDPR places the regulatory responsibility for further defining how the Member States strike a balance between the individuals' rights and the public interest in research within their national legal orders. Since Member States' approaches to the trade-off between data subjects' rights on the one hand, and appropriate safeguards on the other, differ according to their ethical and legal traditions, their data protection requirements for research also differ considerably. This study takes a comprehensive approach to determine how the GDPR affects regulatory regimes on the use of personal data in biobanking research, with a particular focus on the balance between individuals' rights, public interest and scientific research. In this regard, it has two main goals: first, to scrutinize the GDPR research regime, its objective and constitutive elements, the impact it has on biobanking, and its role in a changing EU landscape post-Brexit; and second, to examine how various exceptions have been operationalized nationally, and what challenges and opportunities this diversification entails. The book not only captures the complexity GDPR creates for biobanking, but also sheds light on various approaches to tackling the corresponding challenges. It offers the first comprehensive analysis of GDPR for biobanking, and the most up-to-date overview of the national biobank regulatory frameworks in Europe.

Computer Aided Verification

Authors: ---
Book Series: Lecture Notes in Computer Science; Theoretical Computer Science and General Issues ISBN: 9783030532888 Year: Pages: 669 DOI: 10.1007/978-3-030-53288-8 Language: English
Publisher: Springer Nature
Subject: Computer Science
Added to DOAB on : 2020-09-01 00:03:41
License:

Loading...
Export citation

Choose an application

Abstract

The open access two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer Aided Verification, CAV 2020, held in Los Angeles, CA, USA, in July 2020.* The 43 full papers presented together with 18 tool papers and 4 case studies, were carefully reviewed and selected from 240 submissions. The papers were organized in the following topical sections: Part I: AI verification; blockchain and Security; Concurrency; hardware verification and decision procedures; and hybrid and dynamic systems. Part II: model checking; software verification; stochastic systems; and synthesis. *The conference was held virtually due to the COVID-19 pandemic.

Listing 1 - 5 of 5
Sort by
Narrow your search

Publisher

Springer Nature (5)


License

CC by (5)


Language

english (5)


Year
From To Submit

2021 (2)

2020 (2)

2017 (1)