Listing 1 - 10 of 111 | << page >> |
Sort by
|
Choose an application
Chiffrierung. --- Datensicherung. --- SSL. --- TLS.
Choose an application
Bekannte Techniken für die Verwaltung und Überprüfung von Zertifikaten wurden zur Unterstützung von PKIs entwickelt. Aufgrund verschiedener Defizite dieser Techniken bezüglich Performanz und Sicherheit wird ein eigener Ansatz vorgestellt. Dieser Ansatz greift auf Vorgängerarbeiten zurück, im Wesentlichen auf Arbeiten von Ralph Charles Merkle, Irene Gassko et. al und Ahto Buldas. Einen wichtigen Baustein des vorgestellten Ansatzes bildet die Datenstruktur mit der Bezeichnung Improved Certification Verification Tree (I-CVT). Diese ermöglicht die kosteneffiziente und sichere Verwaltung und Überprüfung von Attributszertifikaten und kann die Basis einer sogenannten Privilege Management Infrastructure bilden. Basierend auf der I-CVT-Technik können die mit Attributszertifikaten verbundenen Verwaltungskosten niedrig gehalten werden. Wichtiger noch, dass mit Hilfe von I-CVTs die Überprüfung sowohl einzelner als auch gleichzeitig mehrerer Attributszertifikate einer Zertifizierungsstelle effizient und sicher durchführbar ist. Anhand von I-CVTs lassen sich so genannte Vollständigkeitsbeweise generieren. Diese verhindern die unbemerkte Zurückhaltung von auf eine Anfrage passenden Attributszertifikaten durch die diese speichernde Datenbank. Angenommen wird dabei, dass der Anfragende die Anzahl jener Attributszertifikate im Voraus nicht kennt. Einen Spezialfall für Vollständigkeitsbeweise bilden Anfragen, welche höchstens einen Treffer haben können. In solchen Fällen können so genannte Existenz-Beweise beziehungsweise Nicht-Existenz-Beweise generiert und vom Anfragenden ausgewertet werden, je nach Erfolg der jeweiligen Suche. Die Möglichkeit, solche Beweise zu generieren macht den Einsatz von I-CVTs neben der gewünschten sicheren Zugriffskontrolle auch für zahlreiche andere Szenarien attraktiv, die auf Datenbankanfragen basieren. Aus Sicht der performanten Überprüfung während der Zugriffskontrolle haben Attributszertifikate, welche durch Delegierung entstanden, eine Sonderstellung. Bei der zertifikatsbasierten Rechtedelegierung entstehen so genannte Delegierungsnetzwerke, die in den einfachsten Fällen eine Delegierungskette (engl. Delegation Chain) bilden. Ein solches Netzwerk besteht aus Zertifikaten, die von verschiedenen Stellen ausgestellt wurden. Den vertrauten Ursprung solcher Netzwerke, falls es überhaupt einen gibt, während der Zugriffskontrolle zu finden, kann lange Wartezeiten im System verursachen. Ein Vorschlag von Tuomas Aura den hiermit verbundenen Aufwand zu reduzieren, war die Reduktion derartiger Netzwerke auf Attributszertifikate, welche direkt von vertrauten Instanzen ausgestellt werden. Dies hat eine wesentliche Vereinfachung der Ursprungsprüfung delegierter Berechtigungen zur Folge. Einen sicheren Dienst für diesen Zweck innerhalb einer PMI zu konstruieren wirft aber etliche Probleme auf, welche diskutiert werden. In dieser Arbeit wird deshalb neben anderen Konzepten die Technik der so genannten Offline-Delegierung vorgeschlagen. Sie bietet eine einfache Lösung des Problems, indem die gleiche Nutzfunktionalität - sprich die Weitergabe von Berechtigungen - ganz ohne das Entstehen von Delegierungsnetzwerken geschieht. Dies macht die Ursprungsprüfung der Delegierungen einfacher sowie eine nachträgliche Reduzierung von Delegierungsnetzwerken unnötig. Die kombinierte Verwendung von I-CVTs und der Offline-Delegierung bildet das theoretische Fundament eines prototypisch implementierten Systems mit der Kurzbezeichnung PAMINA (Privilege Administration and Management INfrAstructure). Die den jeweiligen Bedürfnissen anpassbare und erweiterbare Komponenten des Systems PAMINA Administration Server, Privilege Database und Certificate Verifier ermöglichen eine flexible Einführung in eine Betriebsumgebung. Die Tragfähigkeit von PAMINA wurde bei der Absicherung eines an der Universität Karlsruhe entwickelten internetbasierten Lernsystems mit der Bezeichnung ed.tec demonstriert.
Datensicherung --- Elektronische Unterschrift --- Zugriffskontrolle --- Zugriffsrelation --- Zertifikat --- Computersicherheit --- Zertifizierungsstelle
Choose an application
Authentifikation --- Authentifikation. --- Chiffrierung --- Chiffrierung. --- Computer security --- Computersicherheit. --- Cryptography --- Datensicherung. --- Digital Rights Management --- Digital Rights Management. --- Kryptoanalyse --- Kryptoanalyse. --- Kryptologie. --- Privatsphäre. --- Rechnernetz --- Rechnernetz. --- Kryptologie --- Privatsphäre --- Datensicherung --- Computersicherheit
Choose an application
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries. Chapters new to this edition include such timely topics as Cyber Warfare, Endpoint Security, Ethical Hacking, Internet of Things Security, Nanoscale Networking and Communications Security, Social Engineering, System Forensics, Wireless Sensor Network Security, Verifying User and Host Identity, Detecting System Intrusions, Insider Threats, Security Certification and Standards Implementation, Metadata Forensics, Hard Drive Imaging, Context-Aware Multi-Factor Authentication, Cloud Security, Protecting Virtual Infrastructure, Penetration Testing, and much more. Online chapters can also be found on the book companion website: https://www.elsevier.com/books-and-journals/book-companion/9780128038437 Written by leaders in the field Comprehensive and up-to-date coverage of the latest security technologies, issues, and best practices Presents methods for analysis, along with problem-solving techniques for implementing practical solutions
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer security. --- Data protection. --- Rechnernetz --- Computersicherheit --- Datensicherung --- Informationssystem --- Datenschutz
Choose an application
Status of persons --- Human rights --- Belgium --- #SBIB:35H24 --- Informatiemanagement bij de overheid --- BPB --- gegevensbescherming --- Belgique --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Bélgica --- Belgija --- Belgien --- Belgie --- Belgicko --- België --- Beļģija --- Белгија --- Belgio --- Белгия --- Belgia --- il-Belġju --- An Bheilg --- Βέλγιο --- Belgjika --- Belgia Kuningriik --- Beļģijas Karaliste --- Royaume de Belgique --- Belgian kuningaskunta --- Belgické kráľovstvo --- Koninkrijk België --- Belgijos Karalystė --- das Königreich Belgien --- Βασίλειο του Βελγίου --- Kingdom of Belgium --- Кралство Белгија --- Краљевина Белгија --- Belgické království --- Reino de Bélgica --- ir-Renju tal-Belġju --- Regatul Belgiei --- Kongeriget Belgien --- Кралство Белгия --- Mbretëria e Belgjikës --- Belga Királyság --- Królestwo Belgii --- Konungariket Belgien --- Reino da Bélgica --- Kraljevina Belgija --- Regno del Belgio --- Comité P
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Critical Information Infrastructures Security, CRITIS 2007, held in Benalmadena-Costa, Spain, in October 2007 in conjunction with ITCIP 2007, the first conference on Information Technology for Critical Infrastructure Protection. The 29 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers address all security-related heterogeneous aspects of critical information infrastructures and are organized in topical sections on R&D agenda, communication risk and assurance, code of practice and metrics, information sharing and exchange, continuity of services and resiliency, SCADA and embedded security, threats and attacks modeling, as well as information exchange and modeling.
Computer Science. --- Computer Communication Networks. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Computers and Society. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Information Systems. --- Informatique --- Réseaux d'ordinateurs --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Logiciels --- Computer security --- Computers --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Information storage and retrieval systems --- Systèmes d'information --- Kritische Informationsinfrastruktur --- Computersicherheit --- Datensicherung --- Kryptoanalyse --- Risikoanalyse --- Computer communication systems. --- Computer security. --- Algorithms. --- User interfaces (Computer systems). --- Computers and civilization. --- User Interfaces and Human Computer Interaction. --- Civilization and computers --- Civilization --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Cryptology. --- Software, Computer
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.
Computer science. --- Computer Communication Networks. --- Computer system performance. --- Computer software. --- Computer Science. --- Algorithm Analysis and Problem Complexity. --- Information Systems Applications (incl. Internet). --- System Performance and Evaluation. --- Computer Science, general. --- Wireless communication systems --- Mobile computing --- Engineering & Applied Sciences --- Computer Science --- Management --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Software, Computer --- Informatics --- Computer communication systems. --- Computer system failures. --- Algorithms. --- Datensicherung. --- Datenverwaltung. --- Drahtloses Sensorsystem. --- Funknetz. --- Netzwerktopologie. --- Netzwerkverwaltung. --- Topologie --- Netzform --- Netzstruktur --- Netztopologie --- Netzarchitektur --- Rechnernetz --- Radio network --- Wireless network --- Drahtloses Telekommunikationsnetz --- Telekommunikationsnetz --- Wireless sensor network --- Drahtloses Sensornetz --- Sensorsystem --- Datenmanagement --- Dateiverwaltung --- Datensicherheit --- Sicherheit --- Computersicherheit --- Softwareschutz --- Netzwerkmanagement --- Network management --- Netzmanagement --- Telecommunication systems --- Netzwerk --- Datenverarbeitung --- Science --- Computer systems --- Application software. --- Computer failures --- Computer malfunctions --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Algorism --- Algebra --- Arithmetic --- Failures --- Distributed processing --- Foundations --- Computer networks. --- Electronic digital computers—Evaluation. --- Computer and Information Systems Applications.
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.
Computer science. --- Computer Communication Networks. --- Computer network architectures. --- Software engineering. --- Data protection. --- Information Systems. --- Computer Science. --- Systems and Data Security. --- e-Commerce/e-business. --- Computer System Implementation. --- Management of Computing and Information Systems. --- Software Engineering. --- Computer security --- Engineering & Applied Sciences --- Computer Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer software engineering --- Architectures, Computer network --- Network architectures, Computer --- Informatics --- Computer communication systems. --- Architecture, Computer. --- Computer security. --- Management information systems. --- E-commerce. --- Computersicherheit. --- Eindringerkennung. --- Kryptoanalyse. --- Malware. --- Softwareschwachstelle. --- Software Vulnerability --- Sicherheitslücke --- Exploit --- Malicious software --- Malicious code --- Böswillige Software --- Schadsoftware --- Schadprogramm --- Computervirus --- Spyware --- Cryptoanalysis --- Angriff --- Attacke --- Kryptoanalytische Attacke --- Kryptoanalytischer Angriff --- Cryptanalysis --- Kryptologie --- Dechiffrierung --- Intrusion Detection --- Einbruchserkennung --- Erkennen von Eindringversuchen --- Erkennung von Eindringlingen --- Intruder Detection --- Eindring-Erkennungssystem --- Intrusion Detection System --- IDS --- Eindringerkennungssystem --- Computersicherheit --- Datenverarbeitungssystem --- Computer --- Datensicherung --- Softwareschutz --- Sicherheit --- Cybersicherheit --- IT-Sicherheit --- Engineering --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Angriffserkennungssystem --- Informationssicherheit --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Architecture, Computer --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Communication systems --- Distributed processing
Choose an application
This book delves into the intersection of artificial intelligence (AI) and data protection laws, particularly focusing on the GDPR (General Data Protection Regulation). It explores the challenges AI poses to privacy and personal data, while assessing the adequacy of current legal frameworks in addressing these issues. The text discusses the European Union's strategic approach to AI, emphasizing ethical guidelines and trustworthy AI development. The book is intended for legal professionals, researchers, and policymakers interested in the implications of AI on privacy laws and ethical considerations.
European law --- Human rights --- Artificial intelligence. Robotics. Simulation. Graphics --- European Union --- Droit à la vie privée. --- Protection de l'information (informatique) --- Intelligence artificielle --- Informatique --- Droit des technologies de l'information et de la communication. --- Droit européen --- Droit. --- E-books --- BPB2007 --- protection des données --- STRADALEX --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- gegevensbescherming --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- Respect de la vie privée (informatique) Bescherming van het privé-leven (informatica) --- données data --- Information technology --- Privacy, Right of --- Data protection --- Artificial intelligence --- Electronic data processing --- Droit à la vie privée --- Protection de l'information (Informatique) --- Law and legislation --- Droit --- Belgique --- protection des données --- Law and legislation.
Choose an application
Dans une période où les libertés économiques de circulation (droit économique, libre-échange, commerce international et libertés européennes de circulation) sont de plus en plus contestées, il importe de livrer une réflexion approfondie sur la capacité des disciplines (droit, sciences humaines et sociales, sciences dures) à questionner le sens de ces libertés. Différents savoirs interrogent ainsi la conception que leurs constructions et analyses portent sur ces libertés. Quelles sont les directions prises ? Quelles sont les finalités poursuivies ? Faut-il constater des points de rupture entre les ambitions initiales et les réalisations observables aujourd’hui ? Associant chercheurs confirmés et jeunes chercheurs dans un dialogue intergénérationnel, cet ouvrage revêt de manière originale un caractère pluridisciplinaire, international et comparé. Il place les dynamiques contemporaines du droit économique et des phénomènes de circulation dans une perspective permettant leur compréhension à travers des études organisées autour d’enjeux clairement identifiés
International law --- Economic law --- Droit international économique. --- Droit européen. --- Liberté économique. --- Libre-échange. --- Principes généraux du droit européen. --- Free trade --- Freedom of movement --- International economic relations --- Capital movements --- Libre-échange --- Libre circulation des personnes --- Relations économiques internationales --- Droit international --- Mouvements de capitaux --- Economic aspects. --- Aspect économique --- gegevensbescherming --- zaštita podataka --- tietosuoja --- ochrana údajov --- databeskyttelse --- protecția datelor --- adatvédelem --- përpunim i të dhënave --- Datenschutz --- varstvo podatkov --- protección de datos --- protection des données --- cosaint sonraí --- proteção dos dados --- uppgiftsskydd --- duomenų apsauga --- andmekaitse --- ochrona danych --- datu aizsardzība --- προστασία δεδομένων --- ochrana údajů --- защита на информация --- protezzjoni tad-data --- заштита на податоци --- data protection --- заштита података --- protezione dei dati --- Datensicherung --- varnost podatkov --- andmeturve --- ασφάλεια των δεδομένων --- zajištění dat --- dataskydd --- ochrana dat --- databeveiliging --- segurança de dados --- slándáil sonraí --- bezpečnost dat --- безбедност на податоци --- Datensicherheit --- data security --- datu drošība --- gegevensbeveiliging --- aineistoturvallisuus --- sigurnost podataka --- protecção dos dados --- sigurtà tad-data --- сигурност података --- datos protegidos --- sicurezza dei dati --- tietoturva --- zabezpečení údajů --- сигурност на данните --- sécurité des données --- bezpečnosť osobných údajov --- заштита на лични податоци --- bezpieczeństwo danych --- beveiliging van gegevens --- adatbiztonság --- zaštita informacija --- ochrana informací --- duomenų saugumas --- zabezpečení dat --- protezione dei dati personali --- securitate a datelor --- сигурност на податоци --- andmete turvalisus --- economie --- économie
Listing 1 - 10 of 111 | << page >> |
Sort by
|