Security and Trust Management [electronic resource] : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi.
Record details
- ISBN: 9783642380044
- Physical Description: X, 321 p. 74 illus. online resource.
- Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : 2013.
Search for related items by subject
Search for related items by series
Electronic resources
| Policy Enforcement and Monitoring | ||
| Cost-Aware Runtime Enforcement of Security Policies | ||
| Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors | ||
| Lazy Security Controllers | ||
| Access Control | ||
| Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities | ||
| Labeled Goal-Directed Search in Access Control Logic | ||
| A Use-Based Approach for Enhancing UCON | ||
| Analysis of Communicating Authorization Policies | ||
| Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation | ||
| Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures | ||
| Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy | ||
| Distributed Systems and Physical Security | ||
| Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification | ||
| DOT-COM: Decentralized Online Trading and COMmerce | ||
| Formalizing Physical Security Procedures | ||
| Authentication | ||
| A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items | ||
| Authenticating Email Search Results | ||
| Software Authentication to Enhance Trust in Body Sensor Networks | ||
| YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM | ||
| Security Policies | ||
| Boosting Model Checking to Analyse Large ARBAC Policies | ||
| Constrained Role Mining | ||
| A Datalog Semantics for Paralocks. |