000890291 000__ 05681cam\a2200649Ii\4500 000890291 001__ 890291 000890291 005__ 20230306145920.0 000890291 006__ m\\\\\o\\d\\\\\\\\ 000890291 007__ cr\cn\nnnunnun 000890291 008__ 190510s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000890291 019__ $$a1103802916 000890291 020__ $$a9783030184193$$q(electronic book) 000890291 020__ $$a3030184196$$q(electronic book) 000890291 020__ $$z9783030184186 000890291 0247_ $$a10.1007/978-3-030-18419-3$$2doi 000890291 035__ $$aSP(OCoLC)on1100767195 000890291 035__ $$aSP(OCoLC)1100767195$$z(OCoLC)1103802916 000890291 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dDKU$$dUKMGB$$dUPM$$dOCLCO$$dOCLCF 000890291 049__ $$aISEA 000890291 050_4 $$aQA76.9.A25 000890291 08204 $$a005.8$$223 000890291 1112_ $$aFPS (Symposium)$$n(11th :$$d2018 :$$cMontréal, Québec) 000890291 24510 $$aFoundations and practice of security :$$b11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised selected papers /$$cNur Zincir-Heywood, Guillaume Bonfante, Mourad Debbabi, Joaquin Garcia-Alfaro (eds.). 000890291 2463_ $$aFPS 2018 000890291 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000890291 300__ $$a1 online resource (xi, 317 pages) :$$billustrations. 000890291 336__ $$atext$$btxt$$2rdacontent 000890291 337__ $$acomputer$$bc$$2rdamedia 000890291 338__ $$aonline resource$$bcr$$2rdacarrier 000890291 347__ $$atext file$$bPDF$$2rda 000890291 4901_ $$aLecture notes in computer science ;$$v11358 000890291 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000890291 500__ $$aIncludes author index. 000890291 50500 $$g[I].$$tInvited papers:$$g1.$$tSecuring Internet of Things /$$rGuang Gong --$$g2.$$tPrivacy and ethical challenges in big data /$$rSébastien Gambs. 000890291 50580 $$g[II].$$tMobile security:$$g3.$$tDecentralized dynamic security enforcement for mobile applications with CliSeAuDroid /$$rTobias Hamann and Heiko Mantel --$$g4.$$tMobile travel credentials /$$rDavid Bissessar, Maryam Hezaveh, Fayzah Alshammari, and Carlisle Adams. 000890291 50580 $$g[III].$$tCloud security and big data:$$g5.$$tCloud security auditing : major approaches and existing challenges /$$rSuryadipta Majumdar, Taous Madi, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, and Mourad Debbabi --$$g6.$$tSecure joins with MapReduce /$$rXavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, and Lihua Ye --$$g7.$$tDaedalus : network anomaly detection on IDS stream logs /$$rAniss Chohra, Mourad Debbabi, and Paria Shirani. 000890291 50580 $$g[IV].$$tIoT security:$$g8.$$tConfiguring data flows in the Internet of Things for security and privacy requirements /$$rLuigi Logrippo and Abdelouadoud Stambouli --$$g9.$$tValidating requirements of access control for cloud-edge IoT solutions /$$rTahir Ahmad and Silvio Ranise. 000890291 50580 $$g[V].$$tSoftware security, malware analysis, and vulnerability detection:$$g10.$$tEvading deep neural network and random forest classifiers by generating adversarial samples /$$rErick Eduardo Bernal Martinez, Bella Oh, Feng Li, and Xiao Luo --$$g11.$$tProtection of systems against fuzzing attacks /$$rLéopold Ouairy, Hélène Le-Bouder, and Jean-Louis Lanet --$$g12.$$tA comparative study across static and dynamic side-channel countermeasures /$$rYuri Gil Dantas, Tobias Hamann, and Heiko Mantel. 000890291 50580 $$g[VI].$$tCryptography:$$g13.$$tCard-based cryptographic protocols with the minimum number of cards using private operations /$$rHibiki Ono and Yoshifumi Manabe --$$g14.$$tCryptographic formula obfuscation /$$rGiovanni Di Crescenzo --$$g15.$$tFault analysis of the new Ukrainian hash function standard : Kupyna /$$rOnur Duman and Amr Youssef. 000890291 50580 $$g[VII].$$tCyber physical security and hardware security:$$g16.$$tWhen fault injection collides with hardware complexity /$$rSebanjila Kevin Bukasa, Ludovic Claudepierre, Ronan Lashermes, and Jean-Louis Lanet --$$g17.$$tA study on mitigation techniques for SCADA-driven cyber-physical systems /$$rMariana Segovia, Ana Rosa Cavalli, Nora Cuppens, and Joaquin Garcia-Alfaro. 000890291 50580 $$g[VIII].$$tAccess control:$$g18.$$tMining relationship-based access control policies from incomplete and noisy data /$$rThang Bui, Scott D. Stoller, and Jiajie Li --$$g19.$$tFine-grained access control for microservices /$$rAntonio Nehme, Vitor Jesus, Khaled Mahbub, and Ali Abdallah --$$g20.$$tAchieving mobile-health privacy using attribute-based access control /$$rVignesh Pagadala and Indrakshi Ray. 000890291 506__ $$aAccess limited to authorized users. 000890291 520__ $$aThis book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control. --$$cProvided by publisher. 000890291 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed May 10, 2019). 000890291 650_0 $$aComputer security$$vCongresses. 000890291 650_0 $$aData encryption (Computer science)$$vCongresses. 000890291 7001_ $$aZincir-Heywood, Nur,$$eeditor. 000890291 7001_ $$aBonfante, Guillaume,$$eeditor. 000890291 7001_ $$aDebbabi, Mourad,$$eeditor. 000890291 7001_ $$aGarcia-Alfaro, Joaquin,$$eeditor. 000890291 77608 $$iPrint version: $$z9783030184186 000890291 830_0 $$aLecture notes in computer science ;$$v11358. 000890291 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000890291 852__ $$bebk 000890291 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-18419-3$$zOnline Access$$91397441.1 000890291 909CO $$ooai:library.usi.edu:890291$$pGLOBAL_SET 000890291 980__ $$aEBOOK 000890291 980__ $$aBIB 000890291 982__ $$aEbook 000890291 983__ $$aOnline 000890291 994__ $$a92$$bISE