Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Security and Trust Management

8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9783642380044
Veröffentl:
2013
Seiten:
321
Autor:
Audun Jøsang
Serie:
7783, Lecture Notes in Computer Science Security and Cryptology
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012).
Policy Enforcement and Monitoring.- Cost-Aware Runtime Enforcement of Security Policies.- Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors.- Lazy Security Controllers.- Access Control.- Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities.- Labeled Goal-Directed Search in Access Control Logic.- A Use-Based Approach for Enhancing UCON.- Analysis of Communicating Authorization Policies.- Trust, Reputation, and Privacy Building Trust and Reputation In: A Development Framework for Trust Models Implementation.- Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures.- Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy.- Distributed Systems and Physical Security.- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification.- DOT-COM: Decentralized Online Trading and COMmerce.- Formalizing Physical Security Procedures.- Authentication.- A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items.- Authenticating Email Search Results.- Software Authentication to Enhance Trust in Body Sensor Networks.- YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM.- Security Policies.- Boosting Model Checking to Analyse Large ARBAC Policies.- Constrained Role Mining.- A Datalog Semantics for Paralocks.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.

Google Plus
Powered by Inooga