Limit search to available items
Book Cover
E-book
Author STM (Conference) (9th : 2013 : Egham, England)

Title Security and trust management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings / Rafael Accorsi, Silvio Ranise (eds.)
Published Heidelberg : Springer, 2013

Copies

Description 1 online resource (x, 235 pages) : illustrations
Series Lecture Notes in Computer Science, 0302-9743 ; 8203
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8203.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Privacy. On Enhancement of 'Share The Secret' Scheme for Location Privacy / Costas Delakouridis and Christos Anagnostopoulos -- New Attacks against Transformation-Based Privacy-Preserving Linear Programming / Peeter Laud and Alisa Pankova -- Maintaining Database Anonymity in the Presence of Queries / Ryan Riley, Chris Clifton and Qutaibah Malluhi -- Network, Web, and Mobile Security. A Probabilistic Framework for Distributed Localization of Attackers in MANETs / Alessandra De Benedictis [and others] -- MITHYS: Mind The Hand You Shake -- Protecting Mobile Devices from SSL Usage Vulnerabilities / Mauro Conti, Nicola Dragoni and Sebastiano Gottardo -- Evaluating the Manageability of Web Browsers Controls / Alexios Mylonas, Nikolaos Tsalis and Dimitris Gritzalis -- Security Protocols. Using Interpolation for the Verification of Security Protocols / Marco Rocchetto [and others] -- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases / Lil María Rodríguez-Henríquez and Debrup Chakraborty -- Security Policies and Trust Management. Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names / Ana Ferreira [and others] -- Probabilistic Cost Enforcement of Security Policies / Yannis Mallios [and others] -- Selective Disclosure in Datalog-Based Trust Management / Nik Sultana, Moritz Y. Becker and Markulf Kohlweiss -- Business Process Security. Towards a Detective Approach to Process-Centered Resilience / Thomas Koslowski and Christian Zimmermann -- IF-Net: A Meta-Model for Security-Oriented Process Specification / Thomas Stocker, Frank Böhr -- Watermarking for Security. Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation / Javier Franco-Contreras [and others] -- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain / Marco Botta, Davide Cavagnino and Victor Pomponiu
Summary This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies
Notes International conference proceedings
Includes author index
Bibliography Includes author index
Notes Online resource; title from PDF title page (SpringerLink, viewed September 9, 2013)
Subject Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Access control -- Congresses.
Computer networks -- Access control
Computer networks -- Security measures
Computer security
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Accorsi, Rafael, editor
Ranise, Silvio, editor
ISBN 9783642410987
3642410987
3642410979
9783642410970
Other Titles STM 2013