000856737 000__ 03467cam\a2200529Ii\4500 000856737 001__ 856737 000856737 005__ 20230306145151.0 000856737 006__ m\\\\\o\\d\\\\\\\\ 000856737 007__ cr\un\nnnunnun 000856737 008__ 181203s2018\\\\sz\a\\\\o\\\\\101\0\eng\d 000856737 019__ $$a1076945017$$a1080597825$$a1082327515$$a1086533612$$a1112790465 000856737 020__ $$a9783030043728$$q(electronic book) 000856737 020__ $$a303004372X$$q(electronic book) 000856737 020__ $$z9783030043711 000856737 0247_ $$a10.1007/978-3-030-04372-8$$2doi 000856737 035__ $$aSP(OCoLC)on1111639292 000856737 035__ $$aSP(OCoLC)1111639292$$z(OCoLC)1076945017$$z(OCoLC)1080597825$$z(OCoLC)1082327515$$z(OCoLC)1086533612$$z(OCoLC)1112790465 000856737 040__ $$aDLC$$beng$$erda$$epn$$cDLC$$dGW5XE$$dUPM$$dOCLCF$$dDKU$$dUKMGB$$dESU$$dMERER$$dLEAUB$$dCEF$$dOCLCO$$dU3W$$dOCLCQ$$dGZM 000856737 049__ $$aISEA 000856737 050_4 $$aQA76.9.A25 000856737 08204 $$a005.8$$223 000856737 1112_ $$aETAA (Workshop)$$n(1st :$$d2018 :$$cBarcelona, Spain) 000856737 24510 $$aEmerging technologies for authorization and authentication :$$bfirst International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings /$$cAndrea Saracino, Paolo Mori (eds.). 000856737 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2018] 000856737 300__ $$a1 online resource (ix, 129 pages) :$$billustrations 000856737 336__ $$atext$$btxt$$2rdacontent 000856737 337__ $$acomputer$$bc$$2rdamedia 000856737 338__ $$aonline resource$$bcr$$2rdacarrier 000856737 4901_ $$aLecture notes in computer science ;$$v11263 000856737 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000856737 500__ $$aInternational conference proceedings. 000856737 500__ $$aIncludes author index. 000856737 504__ $$aIncludes bibliographical references and index. 000856737 5050_ $$aAuthentication and authorization techniques -- Authentication and authorization for interoperable IoT architecture -- Bringing Access Control Tree to Big Data -- SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme -- A Protocol to Strengthen Password-Based Authentication(short paper) -- Managing Private Credentials by Privacy-Preserving Biometrics -- Policy Support for Autonomous Swarms of Drones -- Violation Detection and Countermeasures -- A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts -- Towards a Framework for Testing the Security of IoT Devices Consistently -- Misuse Detection in a Simulated IaaS Environment -- Dissuading Stolen Password Reuse. 000856737 506__ $$aAccess limited to authorized users. 000856737 520__ $$aThis book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. 000856737 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 3, 2018). 000856737 650_0 $$aComputer security$$vCongresses. 000856737 650_0 $$aComputer networks$$xAccess control$$vCongresses. 000856737 7001_ $$aSaracino, Andrea,$$eeditor. 000856737 7001_ $$aMori, Paolo$$c(Computer scientist),$$eeditor. 000856737 830_0 $$aLecture notes in computer science ;$$v11263. 000856737 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000856737 85280 $$bebk$$hSpringerLink 000856737 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-04372-8$$zOnline Access$$91397441.1 000856737 909CO $$ooai:library.usi.edu:856737$$pGLOBAL_SET 000856737 980__ $$aEBOOK 000856737 980__ $$aBIB 000856737 982__ $$aEbook 000856737 983__ $$aOnline 000856737 994__ $$a92$$bISE