Description |
1 online resource (x, 270 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 6710 |
|
Lecture notes in computer science ; 6710.
|
Contents |
Machine generated contents note: Auto-delegation Mechanism for Access Control Systems / Charles Morisset -- Automated Symbolic Analysis of ARBAC-Policies / Silvio Ranise -- Influence of Attribute Freshness on Decision Making in Usage Control / Artsiom Yautsiukhin -- Rewrite Specifications of Access Control Policies in Distributed Environments / Maribel Fernandez -- Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management -- Automated Software Distribution for Airplanes / Richard Robinson -- GUTS: A Framework for Adaptive and Configureable Grid User Trust Service / David E. Bakken -- Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System / Barry O'Sullivan -- Authentication Trust Metric for Federated Identity Management Systems / Hidehito Gomi -- Trust-Augmented Voting Scheme for Collaborative Privacy Management / Sjouke Mauw -- Universally Composable NIZK Protocol in an Internet Voting Scheme / Stig Frode Mjølsnes -- Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA / Jose Meseguer -- Defamation-Free Networks through User-Centered Data Control / Ina Schieferdecker -- InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements / Claus Wonnemann -- Stateful Authorization Logic: Proof Theory and a Case Study / Frank Pfenning -- Privacy-Friendly Energy-Metering via Homomorphic Encryption / Bart Jacobs -- Extending an RFID Security and Privacy Model by Considering Forward Untraceability / Mehmet Ufuk Caglayan -- Protecting Privacy of Sensitive Value Distributions in Data Release / Pierangela Samarati |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Operating systems (Computers) |
|
Data encryption (Computer science) |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Data Encryption |
|
Operating Systems |
|
Computers and Society |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
computers |
|
samenleving |
|
society |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and index |
Subject |
Computer security -- Congresses
|
|
Informatique.
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Cuellar, Jorge.
|
ISBN |
9783642224447 |
|
364222444X |
|
9783642224430 |
|
3642224431 |
|