000924940 000__ 03687cam\a2200553Ii\4500 000924940 001__ 924940 000924940 005__ 20230306151202.0 000924940 006__ m\\\\\o\\d\\\\\\\\ 000924940 007__ cr\nn\nnnunnun 000924940 008__ 200128s2020\\\\sz\a\\\\o\\\\\101\0\eng\d 000924940 019__ $$a1140925577 000924940 020__ $$a9783030397494$$q(electronic book) 000924940 020__ $$a3030397491$$q(electronic book) 000924940 020__ $$z9783030397487 000924940 0248_ $$a10.1007/978-3-030-39 000924940 035__ $$aSP(OCoLC)on1137812861 000924940 035__ $$aSP(OCoLC)1137812861$$z(OCoLC)1140925577 000924940 040__ $$aLQU$$beng$$cLQU$$dLEATE$$dGW5XE 000924940 049__ $$aISEA 000924940 050_4 $$aQA76.9.A25 000924940 08204 $$a005.8 000924940 1112_ $$aETAA (Workshop)$$n(2nd :$$d2019 :$$cLuxembourg City, Luxembourg) 000924940 24510 $$aEmerging Technologies for Authorization and Authentication :$$bSecond International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /$$cedited by Andrea Saracino, Paolo Mori. 000924940 2463_ $$aETAA 2019 000924940 264_1 $$aCham :$$bSpringer,$$c2020. 000924940 300__ $$a1 online resource (x, 189 pages) :$$billustrations. 000924940 336__ $$atext$$btxt$$2rdacontent 000924940 337__ $$acomputer$$bc$$2rdamedia 000924940 338__ $$aonline resource$$bcr$$2rdacarrier 000924940 4901_ $$aLecture notes in computer science ;$$v11967 000924940 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000924940 500__ $$aInternational conference proceedings. 000924940 500__ $$aIncludes author index. 000924940 5050_ $$aLogics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. 000924940 506__ $$aAccess limited to authorized users. 000924940 520__ $$aThis book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario. 000924940 650_0 $$aComputer security$$vCongresses. 000924940 650_0 $$aComputer networks$$xAccess control$$vCongresses. 000924940 650_0 $$aData protection. 000924940 650_0 $$aSoftware engineering. 000924940 650_0 $$aArtificial intelligence. 000924940 7001_ $$aSaracino, Andrea. 000924940 7001_ $$aMori, Paolo$$c(Computer scientist) 000924940 830_0 $$aLecture notes in computer science ;$$v11967. 000924940 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000924940 852__ $$bebk 000924940 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-39749-4$$zOnline Access$$91397441.1 000924940 909CO $$ooai:library.usi.edu:924940$$pGLOBAL_SET 000924940 980__ $$aEBOOK 000924940 980__ $$aBIB 000924940 982__ $$aEbook 000924940 983__ $$aOnline 000924940 994__ $$a92$$bISE