


default search action
STM 2012: Pisa, Italy
- Audun Jøsang, Pierangela Samarati, Marinella Petrocchi:

Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7783, Springer 2013, ISBN 978-3-642-38003-7
Policy Enforcement and Monitoring
- Peter Drábik, Fabio Martinelli, Charles Morisset:

Cost-Aware Runtime Enforcement of Security Policies. 1-16 - Yannis Mallios, Lujo Bauer

, Dilsun Kirli Kaynar, Jay Ligatti:
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors. 17-32 - Giulio Caravagna

, Gabriele Costa
, Giovanni Pardini
:
Lazy Security Controllers. 33-48
Access Control
- Michele Barletta, Silvio Ranise

, Luca Viganò:
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities. 49-64 - Valerio Genovese, Deepak Garg, Daniele Rispoli:

Labeled Goal-Directed Search in Access Control Logic. 65-80 - Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis:

A Use-Based Approach for Enhancing UCON. 81-96 - Simone Frau, Mohammad Torabi Dashti

:
Analysis of Communicating Authorization Policies. 97-112
Trust, Reputation, and Privacy
- Francisco Moyano

, M. Carmen Fernández Gago
, Javier López
:
Building Trust and Reputation In: A Development Framework for Trust Models Implementation. 113-128 - Jean-Guillaume Dumas

, Hicham Hossayni:
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures. 129-144 - Meilof Veeningen, Benne de Weger, Nicola Zannone

:
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. 145-160
Distributed Systems and Physical Security
- Nelson Nazzicari, Javier Almillategui, Angelos Stavrou

, Sushil Jajodia
:
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. 161-176 - Moti Geva, Amir Herzberg

:
DOT-COM: Decentralized Online Trading and COMmerce. 177-192 - Catherine Meadows, Dusko Pavlovic

:
Formalizing Physical Security Procedures. 193-208
Authentication
- Sjouke Mauw

, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. 209-224 - Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia:

Authenticating Email Search Results. 225-240 - Joep A. de Groot, Vinh T. Bui, Jean-Paul M. G. Linnartz

, Johan Lukkien, Richard Verhoeven:
Software Authentication to Enhance Trust in Body Sensor Networks. 241-256 - Robert Künnemann, Graham Steel:

YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. 257-272
Security Policies
- Silvio Ranise

, Anh Tuan Truong, Alessandro Armando
:
Boosting Model Checking to Analyse Large ARBAC Policies. 273-288 - Carlo Blundo

, Stelvio Cimato
:
Constrained Role Mining. 289-304 - Bart van Delft, Niklas Broberg, David Sands:

A Datalog Semantics for Paralocks. 305-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














