Security and Trust Management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two i...

Description complète

Détails bibliographiques
Auteurs principaux : Accorsi Rafael (Directeur de publication), Ranise Silvio (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Security and Trust Management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings / edited by Rafael Accorsi, Silvio Ranise.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2013
Cham : Springer Nature
Collection : Security and Cryptology ; 8203
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Security and Trust Management
Autre format: Security and Trust Management
  • Privacy
  • On Enhancement of Share The Secret Scheme for Location Privacy
  • New Attacks against Transformation-Based Privacy-Preserving Linear Programming
  • Maintaining Database Anonymity in the Presence of Queries
  • Network, Web, and Mobile Security
  • A Probabilistic Framework for Distributed Localization of Attackers in MANETs
  • MITHYS: Mind The Hand You Shake
  • Evaluating the manageability of web browsers controls
  • Security Protocols
  • Using Interpolation for the Verification of Security Protocols
  • RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
  • Security Policies and Trust Management
  • Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
  • Probabilistic Cost Enforcement of Security Policies
  • Selective Disclosure in Datalog-based Trust Management
  • Business Process Security
  • Towards a Detective Approach to Business Process-centered Resilience
  • IF-Net: A Meta-model for Security-oriented Process Specification
  • Watermarking for Security
  • Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
  • Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain.