Information Systems Security and Privacy 4th International Conference, ICISSP 2018, Funchal - Madeira, Portugal, January 22-24, 2018, Revised Selected Papers /

This book constitutes the revised selected papers of the Third International Conference on Information Systems Security and Privacy, ICISSP 2018, held in Funchal - Madeira, Portugal, in January 2018. The 15 full papers presented were carefully reviewed and selected from a total of 71 submissions. Th...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Mori, Paolo (Editor, http://id.loc.gov/vocabulary/relators/edt), Furnell, Steven (Editor, http://id.loc.gov/vocabulary/relators/edt), Camp, Olivier (Editor, http://id.loc.gov/vocabulary/relators/edt)
Format: Electronic eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Communications in Computer and Information Science, 977
Subjects:
Online Access:Full Text via HEAL-Link
Table of Contents:
  • Fine-grained Privacy Control for Fitness and Health Applications using the Privacy Management Platform
  • Touch and Move: Incoming Call User Authentication
  • Elicitation of Privacy Requirements for the Internet of Things using ACCESSORS
  • A Simple Attack on CaptchaStar
  • Notify this: Exploiting Android Notifications for Fun and Profit
  • The Current State of the Holistic Privacy and Security Modelling Approach in Business Process and Software Architecture Modelling
  • A Critical Security Analysis of the Password-based Authentication -Honeywords System under Code-corruption Attack
  • GenVote: Blockchain-based Customizable and Secure Voting Platform
  • A Detailed Analysis of the CICIDS2017 Data Set
  • Personalising Security Education: Factors Influencing Individual Awareness and Compliance
  • Managing Cybersecurity Break-ins using Bluetooth Low Energy Devices to Verify Attackers: A Practical Study
  • On Building a Visualisation Tool for Access Control Policies
  • Survey and Guidelines for the Design and Deployment of a Cyber Security Label for SMEs
  • Privacy Preserving Collaborative Agglomerative Hierarchical Clustering Construction
  • Insights into Unsupervised Holiday Detection from Low-Resolution Smart Metering Data.