Security and Trust Management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings
This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013). The 15 revised full papers including two i...
Auteurs principaux : | , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Security and Trust Management : 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings / edited by Rafael Accorsi, Silvio Ranise. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 8203 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Security and Trust Management Autre format: Security and Trust Management |
- Privacy
- On Enhancement of Share The Secret Scheme for Location Privacy
- New Attacks against Transformation-Based Privacy-Preserving Linear Programming
- Maintaining Database Anonymity in the Presence of Queries
- Network, Web, and Mobile Security
- A Probabilistic Framework for Distributed Localization of Attackers in MANETs
- MITHYS: Mind The Hand You Shake
- Evaluating the manageability of web browsers controls
- Security Protocols
- Using Interpolation for the Verification of Security Protocols
- RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
- Security Policies and Trust Management
- Socio-Technical Study On the Effect of Trust and Context when Choosing WiFi Names
- Probabilistic Cost Enforcement of Security Policies
- Selective Disclosure in Datalog-based Trust Management
- Business Process Security
- Towards a Detective Approach to Business Process-centered Resilience
- IF-Net: A Meta-model for Security-oriented Process Specification
- Watermarking for Security
- Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
- Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain.