Emerging Technologies for Authorization and Authentication Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings

This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They...

Full description

Bibliographic Details
Other Authors: Saracino, Andrea (Editor), Mori, Paolo (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2020, 2020
Edition:1st ed. 2020
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03038nmm a2200385 u 4500
001 EB001890984
003 EBX01000000000000001054337
005 00000000000000.0
007 cr|||||||||||||||||||||
008 200224 ||| eng
020 |a 9783030397494 
100 1 |a Saracino, Andrea  |e [editor] 
245 0 0 |a Emerging Technologies for Authorization and Authentication  |h Elektronische Ressource  |b Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings  |c edited by Andrea Saracino, Paolo Mori 
250 |a 1st ed. 2020 
260 |a Cham  |b Springer International Publishing  |c 2020, 2020 
300 |a X, 189 p. 180 illus., 28 illus. in color  |b online resource 
505 0 |a Logics to reason formally about trust computation and manipulation -- An Authorization framework for Cooperate Intelligent Transport Systems -- A Framework for the Validation of Access Control Systems -- The Structure and Agency Policy Language (SAPL) for Attribute Stream-Based Access Control (ASBAC) -- Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication -- Reflexive Memory Authenticator: a proposal for effortless renewable biometrics -- Collaborative Authentication using Threshold Cryptography -- MuFASA: a Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols -- A Risk-driven Model to Minimize the Effects of Human Factors on Smart Devices -- A Formal Security Analysis of the p≡p Authentication Protocol for Decentralized Key Distribution and End-to-End Encrypted Email 
653 |a Computer Communication Networks 
653 |a Computer systems 
653 |a Software engineering 
653 |a Computer System Implementation 
653 |a Artificial Intelligence 
653 |a Software Engineering 
653 |a Computer networks  
653 |a Data protection 
653 |a Artificial intelligence 
653 |a Data and Information Security 
700 1 |a Mori, Paolo  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-030-39749-4 
856 4 0 |u https://doi.org/10.1007/978-3-030-39749-4?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019. The 10 full papers presented in this volume were carefully reviewed and selected from numerous submissions. They focus on new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, techniques for strengthen password based authentication and for dissuading malicious users from stolen password reuse, an approach for discovering authentication vulnerabilities in interconnected accounts, and strategies to optimize the access control decision process in the Big Data scenario