A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
We argue that by leveraging the acquisition of the state of IoT devices (e.g. if an IoT lock is open or locked), it becomes possible to paint a clear picture of events that have occurred. ... The goal of this paper was to address these challenges by presenting a primary account for a general framework and practical approach we term Forensic State Acquisition from Internet of Things (FSAIoT) ... through IoT device state acquisition ARES '17, August 29-September 01, 2017, Reggio Calabria, Italy interfaces. ...doi:10.1145/3098954.3104053 dblp:conf/IEEEares/MeffertCBB17 fatcat:7i3gd7hwyneqhb4jnwgjt7skve
To attain our goal, we conducted a systematic literature review and assessed the reliability of the factors based on the effect sizes reported in the literature. ... The goal of this work is to identify which of the factors are reliably associated with secure behaviour across multiple studies. ... ARES '17, August 29-September 01, 2017, Reggio Calabria, Italy © 2017 Copyright held by the owner/author(s). Publication rights licensed to Association for Computing Machinery. ...doi:10.1145/3098954.3098986 dblp:conf/IEEEares/MayerKV17 fatcat:4bfibcbdgrapjii7ru2b6cipym
The CPT software layers and translation steps can impact the security of the produced applications. One of the most well-known and often-used CPTs is Cordova, formerly known as PhoneGap. ... This paper gives a statistical overview of the adoption of Cordova security best practices and mechanisms in Cordova applications downloaded from the Google Play Store. ... ARES '17, August 29-September 01, 2017, Reggio Calabria, Italy © 2017 Association for Computing Machinery. ...doi:10.1145/3098954.3103162 dblp:conf/IEEEares/WillocxVN17 fatcat:z6ym7skkxfcmdca5defvtwdxcm
We address the question how searchable encryption and access control can be combined. ... While encryption protects the secrets in the data, it also prevents operations on the data. For example in a multi-user se ing, data is o en accessed via search, but encryption prevents search. ... Not for redistribution. e de nitive Version of Record was published in Proceedings of ARES '17, August 29-September 01, 2017, h p://dx.doi.org/10.1145/ 3098954.3098987. ...doi:10.1145/3098954.3098987 dblp:conf/IEEEares/Loken17 fatcat:ymqsggozuzgabmtqzo4ywohaee
These processes are defined by the pilot partners, based on a framework for public participation which has been created by combining information from available best practice guidelines and toolkits and ... D5.1 aims to plan the pilot operation of STEP in detail, and define an evaluation methodology for assessing its impact. ... -PILOT: "Artizan's fair quiz on local and organic products" September 2017 Topic: Environment. ...doi:10.5281/zenodo.1197779 fatcat:2deywfdwsjdxnl7xmddq2qktu4
Invited speech on the Circulating Artefacts project at the British Museum in the session "Illegal Obtaining and Trade of Archaeological Artefacts: status quo and counteraction". ... On the trail of Celts and Helvetians, with an evening under the stars (3 September, one day excursion) ticipants are introduced to Celtic astronomy with a conference by Marguerite Hirt and will enjoy ... programme printed in the Programme Book was last updated on 5 August; any later changes are available on the Annual Meeting website www.e-a-a.org/EAA2019/scientificprogramme, where detailed programme ...doi:10.26180/5e169ee78f3da fatcat:wdnh2rvyivhhjmxpmwwaxvc3r4