My Account Log in

1 option

Emerging Technologies for Authorization and Authentication : First International Workshop, ETAA 2018, Barcelona, Spain, September 7, 2018, Proceedings / edited by Andrea Saracino, Paolo Mori.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Saracino, Andrea, Editor.
Mori, Paolo, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11263
Security and Cryptology ; 11263
Language:
English
Subjects (All):
Data protection.
Software engineering.
Application software.
Computers.
Computer networks.
Biometric identification.
Data and Information Security.
Software Engineering.
Computer and Information Systems Applications.
Computing Milieux.
Computer Communication Networks.
Biometrics.
Local Subjects:
Data and Information Security.
Software Engineering.
Computer and Information Systems Applications.
Computing Milieux.
Computer Communication Networks.
Biometrics.
Physical Description:
1 online resource (IX, 129 pages) : 39 illustrations, 29 illustrations in color.
Edition:
1st ed. 2018.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the First International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2018, held in Barcelona, Spain, in September 2018. The 10 papers presented in this volume were carefully reviewed and selected from 16 submissions. They were organized in two parts: authentication and authorization techniques and violation detection and countermeasures. .
Contents:
Authentication and authorization techniques
Authentication and authorization for interoperable IoT architecture
Bringing Access Control Tree to Big Data
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme
A Protocol to Strengthen Password-Based Authentication(short paper)
Managing Private Credentials by Privacy-Preserving Biometrics
Policy Support for Autonomous Swarms of Drones
Violation Detection and Countermeasures
A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts
Towards a Framework for Testing the Security of IoT Devices Consistently
Misuse Detection in a Simulated IaaS Environment
Dissuading Stolen Password Reuse.
Other Format:
Printed edition:
ISBN:
978-3-030-04372-8
9783030043728
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account