Limit search to available items
Book Cover
E-book
Author STM (Conference) (8th : 2012 : Pisa, Italy)

Title Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers / Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.)
Published Berlin ; New York : Springer, ©2013

Copies

Description 1 online resource (x, 320 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7783
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7783. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Contents Policy Enforcement and Monitoring. Cost-Aware Runtime Enforcement of Security Policies / Peter Drábik, Fabio Martinelli, Charles Morisset -- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors / Yannis Mallios [and others] -- Lazy Security Controllers / Giulio Caravagna, Gabriele Costa, Giovanni Pardini -- Access Control. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities / Michele Barletta, Silvio Ranise, Luca Viganò -- Labeled Goal-Directed Search in Access Control Logic / Valerio Genovese, Deepak Garg, Daniele Rispoli -- A Use-Based Approach for Enhancing UCON / Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis -- Analysis of Communicating Authorization Policies / Simone Frau, Mohammad Torabi Dashti -- Trust, Reputation, and Privacy. Building Trust and Reputation In: A Development Framework for Trust Models Implementation / Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez -- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures / Jean-Guillaume Dumas, Hicham Hossayni -- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy / Meilof Veeningen, Benne de Weger, Nicola Zannone
Distributed Systems and Physical Security. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification / Nelson Nazzicari [and others] -- DOT-COM: Decentralized Online Trading and COMmerce / Moti Geva, Amir Herzberg -- Formalizing Physical Security Procedures / Catherine Meadows, Dusko Pavlovic -- Authentication. A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items / Sjouke Mauw, Selwyn Piramuthu -- Authenticating Email Search Results / Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia -- Software Authentication to Enhance Trust in Body Sensor Networks / Joep de Groot [and others] -- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM / Robert Künnemann, Graham Steel -- Security Policies. Boosting Model Checking to Analyse Large ARBAC Policies / Silvio Ranise, Anh Truong, Alessandro Armando -- Constrained Role Mining / Carlo Blundo, Stelvio Cimato -- A Datalog Semantics for Paralocks / Bart van Delft, Niklas Broberg, David Sands
Summary This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies
Analysis Computer science
Data protection
Data encryption (Computer science)
Information Systems
Systems and Data Security
Management of Computing and Information Systems
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed May 23, 2013)
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Access control -- Congresses.
Computer networks.
Computer security.
Computer Communication Networks
Computer Security
Computer networks
Computer networks -- Access control
Computer networks -- Security measures
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Jøsang, Audun.
Samarati, Pierangela.
Petrocchi, Marinella.
ISBN 9783642380044
3642380042
3642380034
9783642380037
Other Titles STM 2012