Emerging Technologies for Authorization and Authentication : Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings / edited by Andrea Saracino, Paolo Mori.

This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They...

Full description

Saved in:
Bibliographic Details
Corporate Author: ETAA (Workshop) Luxembourg City, Luxembourg)
Other Authors: Saracino, Andrea, Mori, Paolo (Computer scientist)
Format: eBook
Language:English
Published: Cham : Springer, 2020.
Series:Lecture notes in computer science ; 11967.
LNCS sublibrary. Security and cryptology.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 i 4500
001 on1137812861
003 OCoLC
005 20241006213017.0
006 m o d
007 cr nn||||mamaa
008 200128s2020 sz a o 101 0 eng d
040 |a LQU  |b eng  |e pn  |c LQU  |d LEATE  |d GW5XE  |d EBLCP  |d OCLCF  |d OCLCQ  |d SNK  |d OCLCO  |d OCLCQ  |d OCLCO  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1140925577 
020 |a 9783030397494  |q (electronic bk.) 
020 |a 3030397491  |q (electronic bk.) 
020 |z 9783030397487  |q (print) 
024 8 |a 10.1007/978-3-030-39 
035 |a (OCoLC)1137812861  |z (OCoLC)1140925577 
050 4 |a QA76.9.A25 
049 |a HCDD 
111 2 |a ETAA (Workshop)  |n (2nd :  |d 2019 :  |c Luxembourg City, Luxembourg) 
245 1 0 |a Emerging Technologies for Authorization and Authentication :  |b Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings /  |c edited by Andrea Saracino, Paolo Mori. 
246 3 |a ETAA 2019 
264 1 |a Cham :  |b Springer,  |c 2020. 
300 |a 1 online resource (x, 189 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science ;  |v 11967 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
500 |a International conference proceedings. 
505 0 |a Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email. 
520 |a This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario. 
500 |a Includes author index. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Computer networks  |x Access control  |v Congresses. 
650 0 |a Data protection. 
650 0 |a Software engineering. 
650 0 |a Artificial intelligence. 
650 7 |a artificial intelligence.  |2 aat 
650 7 |a Artificial intelligence  |2 fast 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Software engineering  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Saracino, Andrea. 
700 1 |a Mori, Paolo  |c (Computer scientist)  |1 https://id.oclc.org/worldcat/entity/E39PCjF3TjV6RR87j3CFdFBF8C 
830 0 |a Lecture notes in computer science ;  |v 11967. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-030-39749-4  |y Click for online access 
903 |a SPRING-COMP2020 
994 |a 92  |b HCD