Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revise...
Enregistré dans:
Auteur principal : | |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Security and Trust Management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers / edited by Audun Jøsang, Pierangela Samarati, Marinella Petrocchi. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7783 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Security and Trust Management Autre format: Security and Trust Management |
- Policy Enforcement and Monitoring
- Cost-Aware Runtime Enforcement of Security Policies
- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors
- Lazy Security Controllers
- Access Control
- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities
- Labeled Goal-Directed Search in Access Control Logic
- A Use-Based Approach for Enhancing UCON
- Analysis of Communicating Authorization Policies
- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation
- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures
- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
- Distributed Systems and Physical Security
- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification
- DOT-COM: Decentralized Online Trading and COMmerce
- Formalizing Physical Security Procedures
- Authentication
- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items
- Authenticating Email Search Results
- Software Authentication to Enhance Trust in Body Sensor Networks
- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM
- Security Policies
- Boosting Model Checking to Analyse Large ARBAC Policies
- Constrained Role Mining
- A Datalog Semantics for Paralocks.