Description |
1 online resource (x, 235 pages) : illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 8203 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 8203.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Privacy. On Enhancement of 'Share The Secret' Scheme for Location Privacy / Costas Delakouridis and Christos Anagnostopoulos -- New Attacks against Transformation-Based Privacy-Preserving Linear Programming / Peeter Laud and Alisa Pankova -- Maintaining Database Anonymity in the Presence of Queries / Ryan Riley, Chris Clifton and Qutaibah Malluhi -- Network, Web, and Mobile Security. A Probabilistic Framework for Distributed Localization of Attackers in MANETs / Alessandra De Benedictis [and others] -- MITHYS: Mind The Hand You Shake -- Protecting Mobile Devices from SSL Usage Vulnerabilities / Mauro Conti, Nicola Dragoni and Sebastiano Gottardo -- Evaluating the Manageability of Web Browsers Controls / Alexios Mylonas, Nikolaos Tsalis and Dimitris Gritzalis -- Security Protocols. Using Interpolation for the Verification of Security Protocols / Marco Rocchetto [and others] -- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases / Lil María Rodríguez-Henríquez and Debrup Chakraborty -- Security Policies and Trust Management. Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names / Ana Ferreira [and others] -- Probabilistic Cost Enforcement of Security Policies / Yannis Mallios [and others] -- Selective Disclosure in Datalog-Based Trust Management / Nik Sultana, Moritz Y. Becker and Markulf Kohlweiss -- Business Process Security. Towards a Detective Approach to Process-Centered Resilience / Thomas Koslowski and Christian Zimmermann -- IF-Net: A Meta-Model for Security-Oriented Process Specification / Thomas Stocker, Frank Böhr -- Watermarking for Security. Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation / Javier Franco-Contreras [and others] -- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain / Marco Botta, Davide Cavagnino and Victor Pomponiu |
Summary |
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies |
Notes |
International conference proceedings |
|
Includes author index |
Bibliography |
Includes author index |
Notes |
Online resource; title from PDF title page (SpringerLink, viewed September 9, 2013) |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Computer networks -- Access control -- Congresses.
|
|
Computer networks -- Access control
|
|
Computer networks -- Security measures
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Accorsi, Rafael, editor
|
|
Ranise, Silvio, editor
|
ISBN |
9783642410987 |
|
3642410987 |
|
3642410979 |
|
9783642410970 |
|