|
|
|||
|
||||
OverviewThis book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario. Full Product DetailsAuthor: Andrea Saracino , Paolo MoriPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2020 Volume: 11967 Weight: 0.454kg ISBN: 9783030397487ISBN 10: 3030397483 Pages: 189 Publication Date: 25 January 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsLogics to reason formally about trust computation and manipulation.- An Authorization framework for Cooperate Intelligent Transport Systems.- A Framework for the Validation of Access Control Systems.- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC).- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics.- Collaborative Authentication using Threshold Cryptography.- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols.- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices.- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |