Description |
1 online resource (x, 320 pages) : illustrations |
Series |
Lecture notes in computer science, 1611-3349 ; 7783 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7783. 1611-3349
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Policy Enforcement and Monitoring. Cost-Aware Runtime Enforcement of Security Policies / Peter Drábik, Fabio Martinelli, Charles Morisset -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors / Yannis Mallios [and others] -- Lazy Security Controllers / Giulio Caravagna, Gabriele Costa, Giovanni Pardini -- Access Control. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities / Michele Barletta, Silvio Ranise, Luca Viganò -- Labeled Goal-Directed Search in Access Control Logic / Valerio Genovese, Deepak Garg, Daniele Rispoli -- A Use-Based Approach for Enhancing UCON / Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis -- Analysis of Communicating Authorization Policies / Simone Frau, Mohammad Torabi Dashti -- Trust, Reputation, and Privacy. Building Trust and Reputation In: A Development Framework for Trust Models Implementation / Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures / Jean-Guillaume Dumas, Hicham Hossayni -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy / Meilof Veeningen, Benne de Weger, Nicola Zannone |
|
Distributed Systems and Physical Security. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification / Nelson Nazzicari [and others] -- DOT-COM: Decentralized Online Trading and COMmerce / Moti Geva, Amir Herzberg -- Formalizing Physical Security Procedures / Catherine Meadows, Dusko Pavlovic -- Authentication. A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items / Sjouke Mauw, Selwyn Piramuthu -- Authenticating Email Search Results / Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia -- Software Authentication to Enhance Trust in Body Sensor Networks / Joep de Groot [and others] -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM / Robert Künnemann, Graham Steel -- Security Policies. Boosting Model Checking to Analyse Large ARBAC Policies / Silvio Ranise, Anh Truong, Alessandro Armando -- Constrained Role Mining / Carlo Blundo, Stelvio Cimato -- A Datalog Semantics for Paralocks / Bart van Delft, Niklas Broberg, David Sands |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies |
Analysis |
Computer science |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
Bibliography |
Includes bibliographical references and author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed May 23, 2013) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer networks
|
|
Computer networks -- Access control
|
|
Computer networks -- Security measures
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Jøsang, Audun.
|
|
Samarati, Pierangela.
|
|
Petrocchi, Marinella.
|
ISBN |
9783642380044 |
|
3642380042 |
|
3642380034 |
|
9783642380037 |
|