Emerging Technologies for Authorization and Authentication Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings /

This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conf...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Saracino, Andrea. (Editor, http://id.loc.gov/vocabulary/relators/edt), Mori, Paolo. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2020.
Edition:1st ed. 2020.
Series:Security and Cryptology ; 12515
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-64455-0
LEADER 04125nam a22005895i 4500
001 978-3-030-64455-0
003 DE-He213
005 20210624181320.0
007 cr nn 008mamaa
008 201203s2020 gw | s |||| 0|eng d
020 |a 9783030644550  |9 978-3-030-64455-0 
024 7 |a 10.1007/978-3-030-64455-0  |2 doi 
050 4 |a QA75.5-76.95 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
082 0 4 |a 004  |2 23 
245 1 0 |a Emerging Technologies for Authorization and Authentication  |h [electronic resource] :  |b Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings /  |c edited by Andrea Saracino, Paolo Mori. 
250 |a 1st ed. 2020. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2020. 
300 |a VII, 169 p. 47 illus., 31 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 12515 
505 0 |a Deep Learning based Sequential Mining for User Authentication in Web Applications -- An Interoperable Architecture for Usable Password-Less Authentication -- auth.js: Advanced Authentication for the Web -- Automated and Secure Integration of the OpenID Connect iGov Pro le in Mobile Native Applications -- Micro-Id-Gym: a Flexible Tool for Pentesting Identity Management Protocols in the Wild and in the Laboratory -- IFTTT Privacy Checker -- A Comparison Among Policy Editors for Attributed Based Access Control Model -- Automatic rewalls con guration using argumentation reasoning -- On Results of Data Aggregation Operations -- The cost of having been pwned: a security service provider's perspect. 
520 |a This book constitutes the proceedings of the Third International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2020, held in Guildford, UK, in September 2020. The 10 full papers presented in this volume were carefully reviewed and selected from 15 submissions. The conference was planned at University of Surrey, Guildford, UK. Due to COVID-19 outbreak, ESORICS conference and affiliated workshop will be held online. The workshop presents new techniques for biometric and behavioral based authentication, and authorization in the IoT and in distributed systems in general, and much more. 
650 0 |a Computer science. 
650 0 |a Computer security. 
650 0 |a Computer organization. 
650 0 |a Computers. 
650 0 |a Computer networks  |x Security measures. 
650 1 4 |a Computer Science, general.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I00001 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Computer Systems Organization and Communication Networks.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13006 
650 2 4 |a Computing Milieux.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24008 
650 2 4 |a Security Services.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28030 
650 2 4 |a Mobile and Network Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28050 
700 1 |a Saracino, Andrea.  |e editor.  |0 (orcid)0000-0001-8149-9322  |1 https://orcid.org/0000-0001-8149-9322  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mori, Paolo.  |e editor.  |0 (orcid)0000-0002-6618-0388  |1 https://orcid.org/0000-0002-6618-0388  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783030644543 
776 0 8 |i Printed edition:  |z 9783030644567 
830 0 |a Security and Cryptology ;  |v 12515 
856 4 0 |u https://doi.org/10.1007/978-3-030-64455-0 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)