Search Results - "data privacy"

  1. 101
  2. 102
  3. 103
  4. 104

    The Cloud-to-Thing Continuum Opportunities and Challenges in Cloud, Fog and Edge Computing /

    Published 2020
    Table of Contents: “…Optimising availability in IoT -- Chapter 5 - End to End Security and Identity Management Across the Cloud-to-Things Continuum -- Chapter 6 - Trust and Data Privacy in the Internet of Things -- Chapter 7 - Monitoring and Visualizing the Internet of Things -- Chapter 8 - Capturing the Business Value of IOT.…”
    Link to Metadata
    Electronic eBook
  5. 105

    Principles of Security and Trust 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessalonik...

    Published 2018
    Table of Contents: “…Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.…”
    Link to Metadata
    Electronic eBook
  6. 106
  7. 107
  8. 108
  9. 109
  10. 110
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116
  17. 117
  18. 118
  19. 119
  20. 120