Catalog

Record Details

Catalog Search



Security and Trust Management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers  Cover Image E-book E-book

Security and Trust Management [electronic resource] : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi.

Record details

  • ISBN: 9783642380044
  • Physical Description: X, 321 p. 74 illus. online resource.
  • Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : 2013.
Subject: Computer science.
Data protection.
Data encryption (Computer science).
Information Systems.
Computer Science.
Systems and Data Security.
Management of Computing and Information Systems.
Data Encryption.
Computer Science, general.
Computer Science, general.
Computer Science, general.

Electronic resources


Policy Enforcement and Monitoring
Cost-Aware Runtime Enforcement of Security Policies
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors
Lazy Security Controllers
Access Control
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities
Labeled Goal-Directed Search in Access Control Logic
A Use-Based Approach for Enhancing UCON
Analysis of Communicating Authorization Policies
Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
Distributed Systems and Physical Security
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification
DOT-COM: Decentralized Online Trading and COMmerce
Formalizing Physical Security Procedures
Authentication
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items
Authenticating Email Search Results
Software Authentication to Enhance Trust in Body Sensor Networks
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM
Security Policies
Boosting Model Checking to Analyse Large ARBAC Policies
Constrained Role Mining
A Datalog Semantics for Paralocks.

Additional Resources