Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10674)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: NordSec 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 18 full papers presented were carefully reviewed and selected from 42 submissions. The papers address a broad range of topics in IT security and privacy. They are organized in the following topical sections: outsourcing computations; privacy preservation; security and privacy in machine learning; applications; access control; and emerging security areas.
Similar content being viewed by others
Keywords
- access control
- anonymity
- authentication
- cryptography
- data mining
- data privacy
- electronic document identification systems
- encryption
- internet
- keyword search
- network security
- privacy
- privacy preserving
- public key cryptography
- Quality of Service (QoS)
- search engines
- security systems
- semantics
- world wide web
Table of contents (18 papers)
-
Outsourcing Computations
-
Security and Privacy in Machine Learning
-
Applications
-
Access Control
Other volumes
-
Secure IT Systems
Editors and Affiliations
Bibliographic Information
Book Title: Secure IT Systems
Book Subtitle: 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8–10, 2017, Proceedings
Editors: Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-70290-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing AG 2017
Softcover ISBN: 978-3-319-70289-6Published: 04 November 2017
eBook ISBN: 978-3-319-70290-2Published: 03 November 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 313
Number of Illustrations: 77 b/w illustrations
Topics: Systems and Data Security, Cryptology, Information Systems Applications (incl. Internet), Data Mining and Knowledge Discovery, Computers and Society, Computer Systems Organization and Communication Networks