


default search action
STM 2014: Wroclaw, Poland
- Sjouke Mauw

, Christian Damsgaard Jensen
:
Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8743, Springer 2014, ISBN 978-3-319-11850-5 - Vangalur S. Alagar, Kaiyu Wan:

Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation. 1-16 - Thibaud Antignac, Daniel Le Métayer:

Privacy Architectures: Reasoning about Data Minimisation and Integrity. 17-32 - Jason Crampton, Charles Morisset:

Monotonicity and Completeness in Attribute-Based Access Control. 33-48 - Jason Crampton, James Sellwood:

Caching and Auditing in the RPPM Model. 49-64 - Tobias Bamert, Christian Decker

, Roger Wattenhofer, Samuel Welten:
BlueWallet: The Secure Bitcoin Wallet. 65-80 - Aleksandar S. Dimovski

:
Ensuring Secure Non-interference of Programs by Game Semantics. 81-96 - Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino:

Stateful Usage Control for Android Mobile Devices. 97-112 - Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad P. A. van Moorsel:

A Formal Model for Soft Enforcement: Influencing the Decision-Maker. 113-128 - Pankaj Pandey, Einar Arthur Snekkenes:

Using Prediction Markets to Hedge Information Security Risks. 129-145 - Silvio Ranise, Riccardo Traverso:

ALPS: An Action Language for Policy Specification and Automated Safety Analysis. 146-161 - Sonia Santiago

, Santiago Escobar
, Catherine Meadows, José Meseguer:
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. 162-177
Short Papers
- Asad Ali, Maribel Fernández:

Hybrid Enforcement of Category-Based Access Control. 178-182 - Michael Backes, Niklas Grimm, Aniket Kate:

Lime: Data Lineage in the Malicious Environment. 183-187 - Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza:

NoPhish: An Anti-Phishing Education App. 188-192 - Ginés Dólera Tormo, Félix Gómez Mármol

, Gregorio Martínez Pérez:
ROMEO: ReputatiOn Model Enhancing OpenID Simulator. 193-197 - Filip Jurnecka, Martin Stehlík, Vashek Matyas:

Evaluation of Key Management Schemes in Wireless Sensor Networks. 198-203 - Paolo Modesti

:
Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. 204-208

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














