Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/stm:"
@inproceedings{DBLP:conf/stm/AmorimBMP23, author = {Ivone Amorim and Pedro Barbosa and Eva Maia and Isabel Pra{\c{c}}a}, editor = {Ruben Rios and Joachim Posegga}, title = {Privacy-Preserving {NN} for {IDS:} {A} Study on the Impact of {TFHE} Restrictions}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {107--125}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_7}, doi = {10.1007/978-3-031-47198-8\_7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/AmorimBMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Botes23, author = {Marietjie Botes}, editor = {Ruben Rios and Joachim Posegga}, title = {Consent as Mechanism to Preserve Information Privacy: Its Origin, Evolution, and Current Relevance}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {136--145}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_9}, doi = {10.1007/978-3-031-47198-8\_9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Botes23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HilbigSL23, author = {Tobias Hilbig and Thomas Schreck and Tobias Limmer}, editor = {Ruben Rios and Joachim Posegga}, title = {'State of the Union': Evaluating Open Source Zero Trust Components}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {42--61}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_3}, doi = {10.1007/978-3-031-47198-8\_3}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/HilbigSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JeyakumarWR23, author = {Isaac Henderson Johnson Jeyakumar and John Walker and Heiko Ro{\ss}nagel}, editor = {Ruben Rios and Joachim Posegga}, title = {Decentralized Global Trust Registry Platform for Trust Discovery and Verification of e-Health Credentials Using {TRAIN:} {COVID-19} Certificate Use Case}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {95--104}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_6}, doi = {10.1007/978-3-031-47198-8\_6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/JeyakumarWR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KolesnichenkoPCOS23, author = {Pavel V. Kolesnichenko and Dmytro Progonov and Valentyna Cherniakova and Andriy Oliynyk and Oleksandra Sokol}, editor = {Ruben Rios and Joachim Posegga}, title = {Biometric-Based Password Management}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {23--41}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_2}, doi = {10.1007/978-3-031-47198-8\_2}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KolesnichenkoPCOS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NazarenkoKGK23, author = {Emiliia Nazarenko and Felix Klement and Eva Gr{\"{u}}ndinger and Stefan Katzenbeisser}, editor = {Ruben Rios and Joachim Posegga}, title = {Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {65--84}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_4}, doi = {10.1007/978-3-031-47198-8\_4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/NazarenkoKGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Ouaili23, author = {Lydia Ouaili}, editor = {Ruben Rios and Joachim Posegga}, title = {Impact of Consensus Protocols on the Efficiency of Registration and Authentication Process in Self-sovereign Identity}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {3--22}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_1}, doi = {10.1007/978-3-031-47198-8\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Ouaili23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Pohls23, author = {Henrich C. P{\"{o}}hls}, editor = {Ruben Rios and Joachim Posegga}, title = {Towards a Unified Abstract Architecture to Coherently and Generically Describe Security Goals and Risks of {AI} Systems}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {85--94}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_5}, doi = {10.1007/978-3-031-47198-8\_5}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Pohls23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Willemson23, author = {Jan Willemson}, editor = {Ruben Rios and Joachim Posegga}, title = {Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System}, booktitle = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, pages = {126--135}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8\_8}, doi = {10.1007/978-3-031-47198-8\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Willemson23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2022, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-29504-1}, doi = {10.1007/978-3-031-29504-1}, isbn = {978-3-031-29503-4}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2023, editor = {Ruben Rios and Joachim Posegga}, title = {Security and Trust Management - 19th International Workshop, {STM} 2023, The Hague, The Netherlands, September 28, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14336}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47198-8}, doi = {10.1007/978-3-031-47198-8}, isbn = {978-3-031-47197-1}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Botes22, author = {Marietjie Botes}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {The Relevance of Consent in the Digital Age: {A} Consideration of Its Origins and Its Fit for Digital Application}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {177--188}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_10}, doi = {10.1007/978-3-031-29504-1\_10}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Botes22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BuccioliCVNBBLL22, author = {Luca Buccioli and Stefano Cristalli and Edoardo Vignati and Lorenzo Nava and Daniele Badagliacca and Danilo Bruschi and Long Lu and Andrea Lanzi}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {JChainz: Automatic Detection of Deserialization Vulnerabilities for the Java Language}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {136--155}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_8}, doi = {10.1007/978-3-031-29504-1\_8}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BuccioliCVNBBLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HicksMC22, author = {Chris Hicks and Vasilios Mavroudis and Jon Crowcroft}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {SIMple {ID:} {QR} Codes for Authentication Using Basic Mobile Phones in Developing Countries}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {3--23}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_1}, doi = {10.1007/978-3-031-29504-1\_1}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/HicksMC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HoussiauSCAM22, author = {Florimond Houssiau and Vincent Schellekens and Antoine Chatalic and Shreyas Kumar Annamraju and Yves{-}Alexandre de Montjoye}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {M\({}^{\mbox{2}}\)M: {A} General Method to Perform Various Data Analysis Tasks from a Differentially Private Sketch}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {117--135}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_7}, doi = {10.1007/978-3-031-29504-1\_7}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/HoussiauSCAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/IadarolaMMS22, author = {Giacomo Iadarola and Francesco Mercaldo and Fabio Martinelli and Antonella Santone}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Assessing Deep Learning Predictions in Image-Based Malware Detection with Activation Maps}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {104--114}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_6}, doi = {10.1007/978-3-031-29504-1\_6}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/IadarolaMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KirssLSV22, author = {Johanna Maria Kirss and Peeter Laud and Nikita Snetkov and Jelizaveta Vakarjuk}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Server-Supported Decryption for Mobile Devices}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {71--81}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_4}, doi = {10.1007/978-3-031-29504-1\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KirssLSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OserELK22, author = {Pascal Oser and Felix Engelmann and Stefan L{\"{u}}ders and Frank Kargl}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {52--70}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_3}, doi = {10.1007/978-3-031-29504-1\_3}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/OserELK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WangLZSW22, author = {Pan Wang and Zeyi Li and Xiaokang Zhou and Chunhua Su and Weizheng Wang}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion Detection}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {156--174}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_9}, doi = {10.1007/978-3-031-29504-1\_9}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WangLZSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/YuM22, author = {Fangyi Yu and Miguel Vargas Martin}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative Adversarial Networks}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {189--198}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_11}, doi = {10.1007/978-3-031-29504-1\_11}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/YuM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZhaoWYLW22, author = {Yanmin Zhao and Yang Wang and Siu Ming Yiu and Yu Liu and Meiqin Wang}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {A Hierarchical Watermarking Scheme for PRFs from Standard Lattice Assumptions}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {24--51}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_2}, doi = {10.1007/978-3-031-29504-1\_2}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ZhaoWYLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZhouV22, author = {Xin Zhou and Rakesh M. Verma}, editor = {Gabriele Lenzini and Weizhi Meng}, title = {Software Vulnerability Detection via Multimodal Deep Learning}, booktitle = {Security and Trust Management - 18th International Workshop, {STM} 2022, Copenhagen, Denmark, September 29, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13867}, pages = {85--103}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29504-1\_5}, doi = {10.1007/978-3-031-29504-1\_5}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ZhouV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AbelaCMSFGHV21, author = {Robert Abela and Christian Colombo and Peter Malo and Peter S{\'{y}}s and Tom{\'{a}}s Fabsic and Ondrej Gallo and Viliam Hromada and Mark Vella}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Secure Implementation of a Quantum-Future {GAKE} Protocol}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {103--121}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_6}, doi = {10.1007/978-3-030-91859-0\_6}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/AbelaCMSFGHV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ChenLZLC21, author = {Yifei Chen and Meng Li and Shuli Zheng and Chhagan Lal and Mauro Conti}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Where to Meet a Driver Privately: Recommending Pick-Up Locations for Ride-Hailing Services}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {43--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_3}, doi = {10.1007/978-3-030-91859-0\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ChenLZLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FernetM21, author = {Laouen Fernet and Sebastian M{\"{o}}dersheim}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Deciding a Fragment of ({\(\alpha\)} , {\(\beta\)} )-Privacy}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {122--142}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_7}, doi = {10.1007/978-3-030-91859-0\_7}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FernetM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21, author = {Georgios Fotiadis and Jos{\'{e}} Moreira and Thanassis Giannetsos and Liqun Chen and Peter B. R{\o}nne and Mark Ryan and Peter Y. A. Ryan}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {163--184}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_9}, doi = {10.1007/978-3-030-91859-0\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FukumitsuH21, author = {Masayuki Fukumitsu and Shingo Hasegawa}, editor = {Rodrigo Roman and Jianying Zhou}, title = {An Aggregate Signature with Pre-communication in the Plain Public Key Model}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {3--19}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_1}, doi = {10.1007/978-3-030-91859-0\_1}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FukumitsuH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KavousiMS21, author = {Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Efficient Scalable Multi-party Private Set Intersection Using Oblivious {PRF}}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {81--99}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_5}, doi = {10.1007/978-3-030-91859-0\_5}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KavousiMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KhouryRA21, author = {Joud Khoury and Zachary B. Ratliff and Michael Atighetchi}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Towards Decentralized and Provably Secure Cross-Domain Solutions}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {185--203}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_10}, doi = {10.1007/978-3-030-91859-0\_10}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KhouryRA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Laud21, author = {Peeter Laud}, editor = {Rodrigo Roman and Jianying Zhou}, title = {Efficient Permutation Protocol for {MPC} in the Head}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {62--80}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_4}, doi = {10.1007/978-3-030-91859-0\_4}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Laud21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SpielvogelPP21, author = {Korbinian Spielvogel and Henrich C. P{\"{o}}hls and Joachim Posegga}, editor = {Rodrigo Roman and Jianying Zhou}, title = {{TLS} Beyond the Broker: Enforcing Fine-Grained Security and Trust in Publish/Subscribe Environments for IoT}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {145--162}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_8}, doi = {10.1007/978-3-030-91859-0\_8}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/SpielvogelPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Wang21, author = {Yongge Wang}, editor = {Rodrigo Roman and Jianying Zhou}, title = {The Adversary Capabilities in Practical Byzantine Fault Tolerance}, booktitle = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, pages = {20--39}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0\_2}, doi = {10.1007/978-3-030-91859-0\_2}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2021, editor = {Rodrigo Roman and Jianying Zhou}, title = {Security and Trust Management - 17th International Workshop, {STM} 2021, Darmstadt, Germany, October 8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13075}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91859-0}, doi = {10.1007/978-3-030-91859-0}, isbn = {978-3-030-91858-3}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AbadiH20, author = {Eden Abadi and Itay Hazan}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Improved Feature Engineering for Free-Text Keystroke Dynamics}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {93--105}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_6}, doi = {10.1007/978-3-030-59817-4\_6}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AbadiH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AroraM20, author = {Vishal Arora and Manoj Misra}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {39--54}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_3}, doi = {10.1007/978-3-030-59817-4\_3}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AroraM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Baghery20, author = {Karim Baghery}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Subversion-Resistant Commitment Schemes: Definitions and Constructions}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {106--122}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_7}, doi = {10.1007/978-3-030-59817-4\_7}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Baghery20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LeguesseVCH20, author = {Yonas Leguesse and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Reducing the Forensic Footprint with Android Accessibility Attacks}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {22--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_2}, doi = {10.1007/978-3-030-59817-4\_2}, timestamp = {Sun, 23 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/LeguesseVCH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SchillingerS20, author = {Fabian Schillinger and Christian Schindelhauer}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Revocable Access to Encrypted Message Boards}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {57--72}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_4}, doi = {10.1007/978-3-030-59817-4\_4}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SchillingerS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SinghMCR20, author = {Rajiv Ranjan Singh and Jos{\'{e}} Moreira and Tom Chothia and Mark Dermot Ryan}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {3--21}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_1}, doi = {10.1007/978-3-030-59817-4\_1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/SinghMCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SundararajKG20, author = {Aynesh Sundararaj and Silvia Knittl and Jens Grossklags}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Challenges in {IT} Security Processes and Solution Approaches with Process Mining}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {123--138}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_8}, doi = {10.1007/978-3-030-59817-4\_8}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SundararajKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WagnerBB20, author = {Paul Georg Wagner and Pascal Birnstill and J{\"{u}}rgen Beyerer}, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Establishing Secure Communication Channels Using Remote Attestation with {TPM} 2.0}, booktitle = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, pages = {73--89}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4\_5}, doi = {10.1007/978-3-030-59817-4\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WagnerBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2020, editor = {Konstantinos Markantonakis and Marinella Petrocchi}, title = {Security and Trust Management - 16th International Workshop, {STM} 2020, Guildford, UK, September 17-18, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59817-4}, doi = {10.1007/978-3-030-59817-4}, isbn = {978-3-030-59816-7}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BalliDV19, author = {Fatih Balli and F. Bet{\"{u}}l Durak and Serge Vaudenay}, editor = {Sjouke Mauw and Mauro Conti}, title = {BioID: {A} Privacy-Friendly Identity Document}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {53--70}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_4}, doi = {10.1007/978-3-030-31511-5\_4}, timestamp = {Mon, 23 Sep 2019 12:41:12 +0200}, biburl = {https://dblp.org/rec/conf/stm/BalliDV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BernsmedJF19, author = {Karin Bernsmed and Martin Gilje Jaatun and Christian Fr{\o}ystad}, editor = {Sjouke Mauw and Mauro Conti}, title = {Is a Smarter Grid Also Riskier?}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {36--52}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_3}, doi = {10.1007/978-3-030-31511-5\_3}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BernsmedJF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BlomerL19, author = {Johannes Bl{\"{o}}mer and Nils L{\"{o}}ken}, editor = {Sjouke Mauw and Mauro Conti}, title = {Personal Cross-Platform Reputation}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {140--157}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_9}, doi = {10.1007/978-3-030-31511-5\_9}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BlomerL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CimatoCDE19, author = {Stelvio Cimato and Valentina Ciriani and Ernesto Damiani and Maryam Ehsanpour}, editor = {Sjouke Mauw and Mauro Conti}, title = {An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {158--167}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_10}, doi = {10.1007/978-3-030-31511-5\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CimatoCDE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GuttmanR19, author = {Joshua D. Guttman and John D. Ramsdell}, editor = {Sjouke Mauw and Mauro Conti}, title = {Understanding Attestation: Analyzing Protocols that Use Quotes}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {89--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_6}, doi = {10.1007/978-3-030-31511-5\_6}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GuttmanR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MorelliRSST19, author = {Umberto Morelli and Silvio Ranise and Damiano Sartori and Giada Sciarretta and Alessandro Tomasi}, editor = {Sjouke Mauw and Mauro Conti}, title = {Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {19--35}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_2}, doi = {10.1007/978-3-030-31511-5\_2}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MorelliRSST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaeiniN19, author = {Mohammad G. Raeini and Mehrdad Nojoumian}, editor = {Sjouke Mauw and Mauro Conti}, title = {Secure Trust Evaluation Using Multipath and Referral Chain Methods}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {124--139}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_8}, doi = {10.1007/978-3-030-31511-5\_8}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaeiniN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SheikhalishahiN19, author = {Mina Sheikhalishahi and Majid Nateghizad and Fabio Martinelli and Zekeriya Erkin and Marco Loog}, editor = {Sjouke Mauw and Mauro Conti}, title = {On the Statistical Detection of Adversarial Instances over Encrypted Data}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {71--88}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_5}, doi = {10.1007/978-3-030-31511-5\_5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SheikhalishahiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WagnerBB19, author = {Paul Georg Wagner and Pascal Birnstill and J{\"{u}}rgen Beyerer}, editor = {Sjouke Mauw and Mauro Conti}, title = {Challenges of Using Trusted Computing for Collaborative Data Processing}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {107--123}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_7}, doi = {10.1007/978-3-030-31511-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WagnerBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZieglerSL19, author = {Jule Anna Ziegler and Michael Schmidt and Mikael Linden}, editor = {Sjouke Mauw and Mauro Conti}, title = {Improving Identity and Authentication Assurance in Research {\&} Education Federations}, booktitle = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, pages = {1--18}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5\_1}, doi = {10.1007/978-3-030-31511-5\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ZieglerSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2019, editor = {Sjouke Mauw and Mauro Conti}, title = {Security and Trust Management - 15th International Workshop, {STM} 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11738}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31511-5}, doi = {10.1007/978-3-030-31511-5}, isbn = {978-3-030-31510-8}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Donmez18, author = {Tahsin C. M. D{\"{o}}nmez}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Verifiable Outsourcing of Computations Using Garbled Onions}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {122--137}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_8}, doi = {10.1007/978-3-030-01141-3\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/Donmez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Franke18, author = {Ulrik Franke}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Cyber Insurance Against Electronic Payment Service Outages - {A} Document Study of Terms and Conditions from Electronic Payment Service Providers and Insurance Companies}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {73--84}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_5}, doi = {10.1007/978-3-030-01141-3\_5}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Franke18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JhawarLMR18, author = {Ravi Jhawar and Karim Lounis and Sjouke Mauw and Yunior Ram{\'{\i}}rez{-}Cruz}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Semi-automatically Augmenting Attack Trees Using an Annotated Attack Tree Library}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {85--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_6}, doi = {10.1007/978-3-030-01141-3\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JhawarLMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KapustaM18, author = {Katarzyna Kapusta and G{\'{e}}rard Memmi}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {54--69}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_4}, doi = {10.1007/978-3-030-01141-3\_4}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KapustaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LeeY18, author = {Suhho Lee and Seehwan Yoo}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Tux: Trust Update on Linux Booting}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {105--121}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_7}, doi = {10.1007/978-3-030-01141-3\_7}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LeeY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PereraK18, author = {Maharage Nisansala Sevwandi Perera and Takeshi Koshiba}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {3--19}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_1}, doi = {10.1007/978-3-030-01141-3\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/PereraK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaponiP18, author = {Simone Raponi and Roberto Di Pietro}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {A Spark Is Enough in a Straw World: {A} Study of Websites Password Management in the Wild}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {37--53}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_3}, doi = {10.1007/978-3-030-01141-3\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaponiP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/YangEMM18, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Modular Verification of Sequential Composition for Private Channels in Maude-NPA}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {20--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_2}, doi = {10.1007/978-3-030-01141-3\_2}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/YangEMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2018, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3}, doi = {10.1007/978-3-030-01141-3}, isbn = {978-3-030-01140-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ArnaboldiM17, author = {Luca Arnaboldi and Charles Morisset}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {224--233}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_16}, doi = {10.1007/978-3-319-68063-7\_16}, timestamp = {Fri, 12 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ArnaboldiM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CanaveseRBV17, author = {Daniele Canavese and Leonardo Regano and Cataldo Basile and Alessio Viticchi{\'{e}}}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Estimating Software Obfuscation Potency with Artificial Neural Networks}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {193--202}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_13}, doi = {10.1007/978-3-319-68063-7\_13}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CanaveseRBV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DashC17, author = {William Dash and Matthew J. Craven}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Exploring Botnet Evolution via Multidimensional Models and Visualisation}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {72--88}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_5}, doi = {10.1007/978-3-319-68063-7\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DashC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ErdodiJ17, author = {L{\'{a}}szl{\'{o}} Erd{\"{o}}di and Audun J{\o}sang}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Exploit Prevention, Quo Vadis?}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {180--190}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_12}, doi = {10.1007/978-3-319-68063-7\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ErdodiJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17, author = {Olga Gadyatskaya and Ravi Jhawar and Sjouke Mauw and Rolando Trujillo{-}Rasua and Tim A. C. Willemse}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Refinement-Aware Generation of Attack Trees}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {164--179}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_11}, doi = {10.1007/978-3-319-68063-7\_11}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GiorgiMMMS17, author = {Giacomo Giorgi and Antonio La Marra and Fabio Martinelli and Paolo Mori and Andrea Saracino}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Smart Parental Advisory: {A} Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart {TV}}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {118--133}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_8}, doi = {10.1007/978-3-319-68063-7\_8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GiorgiMMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrubeTDM17, author = {Tim Grube and Markus Thummerer and J{\"{o}}rg Daubert and Max M{\"{u}}hlh{\"{a}}user}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Cover Traffic: {A} Trade of Anonymity and Efficiency}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {213--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_15}, doi = {10.1007/978-3-319-68063-7\_15}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrubeTDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HomannGW17, author = {Daniel Homann and Christian G{\"{o}}ge and Lena Wiese}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Dynamic Similarity Search over Encrypted Data with Low Leakage}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {19--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_2}, doi = {10.1007/978-3-319-68063-7\_2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/HomannGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Josang17, author = {Audun J{\o}sang}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {A Consistent Definition of Authorization}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {134--144}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_9}, doi = {10.1007/978-3-319-68063-7\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Josang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KalalaFK17, author = {Kalonji Kalala and Tao Feng and Iluju Kiringa}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {EigenTrust for Hierarchically Structured Chord}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {203--212}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_14}, doi = {10.1007/978-3-319-68063-7\_14}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KalalaFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KikuchiNY17, author = {Hiroaki Kikuchi and Koichi Niihara and Michihiro Yamada}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {How Much is Risk Increased by Sharing Credential in Group?}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {103--117}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_7}, doi = {10.1007/978-3-319-68063-7\_7}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KikuchiNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MelandTMS17, author = {Per H{\aa}kon Meland and Inger Anne T{\o}ndel and Marie Elisabeth Gaup Moe and Fredrik Seehusen}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Facing Uncertainty in Cyber Insurance Policies}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {89--100}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_6}, doi = {10.1007/978-3-319-68063-7\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MelandTMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NoormanMP17, author = {Job Noorman and Jan Tobias M{\"{u}}hlberg and Frank Piessens}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Authentic Execution of Distributed Event-Driven Applications with a Small {TCB}}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {55--71}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_4}, doi = {10.1007/978-3-319-68063-7\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/NoormanMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OgawaTH17, author = {Kazuto Ogawa and Sakurako Tamura and Goichiro Hanaoka}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Key Management for Versatile Pay-TV Services}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {3--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_1}, doi = {10.1007/978-3-319-68063-7\_1}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/OgawaTH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SeyeS17, author = {Papa B. Seye and Augustin P. Sarr}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Enhanced Modelling of Authenticated Key Exchange Security}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {36--52}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_3}, doi = {10.1007/978-3-319-68063-7\_3}, timestamp = {Thu, 14 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SeyeS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17, author = {Jorden Whitefield and Liqun Chen and Frank Kargl and Andrew Paverd and Steve A. Schneider and Helen Treharne and Stephan Wesemeyer}, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Formal Analysis of {V2X} Revocation Protocols}, booktitle = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, pages = {147--163}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7\_10}, doi = {10.1007/978-3-319-68063-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2017, editor = {Giovanni Livraga and Chris J. Mitchell}, title = {Security and Trust Management - 13th International Workshop, {STM} 2017, Oslo, Norway, September 14-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10547}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68063-7}, doi = {10.1007/978-3-319-68063-7}, isbn = {978-3-319-68062-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/0001BP16, author = {Mathias Weber and Annette Bieniusa and Arnd Poetzsch{-}Heffter}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Access Control for Weakly Consistent Replicated Information Systems}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {82--97}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_6}, doi = {10.1007/978-3-319-46598-2\_6}, timestamp = {Sat, 19 Oct 2019 20:20:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/0001BP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BarbonCFS16, author = {Gianluca Barbon and Agostino Cortesi and Pietro Ferrara and Enrico Steffinlongo}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {{DAPA:} Degradation-Aware Privacy Analysis of Android Apps}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {32--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_3}, doi = {10.1007/978-3-319-46598-2\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BarbonCFS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BroekH016, author = {Fabian van den Broek and Brinda Hampiholi and Bart Jacobs}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Securely Derived Identity Credentials on Smart Phones via Self-enrolment}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {106--121}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_8}, doi = {10.1007/978-3-319-46598-2\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BroekH016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CucurullP16, author = {Jordi Cucurull and Jordi Puiggali}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Distributed Immutabilization of Secure Logs}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {122--137}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_9}, doi = {10.1007/978-3-319-46598-2\_9}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CucurullP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FollnerBPCIPB16, author = {Andreas Follner and Alexandre Bartel and Hui Peng and Yu{-}Chen Chang and Kyriakos K. Ispoglou and Mathias Payer and Eric Bodden}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {{PSHAPE:} Automatically Combining Gadgets for Arbitrary Method Execution}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {212--228}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_15}, doi = {10.1007/978-3-319-46598-2\_15}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/FollnerBPCIPB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JamrogaT16, author = {Wojciech Jamroga and Masoud Tabatabaei}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Information Security as Strategic (In)effectivity}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {154--169}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_11}, doi = {10.1007/978-3-319-46598-2\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JamrogaT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JhawarLM16, author = {Ravi Jhawar and Karim Lounis and Sjouke Mauw}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {138--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_10}, doi = {10.1007/978-3-319-46598-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JhawarLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KhanM16, author = {Mohammed Shafiul Alam Khan and Chris J. Mitchell}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Retrofitting Mutual Authentication to {GSM} Using {RAND} Hijacking}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {17--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_2}, doi = {10.1007/978-3-319-46598-2\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KhanM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LenziniMO16, author = {Gabriele Lenzini and Sjouke Mauw and Samir Ouchani}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {170--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_12}, doi = {10.1007/978-3-319-46598-2\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LenziniMO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MartinelliMMS16, author = {Fabio Martinelli and Ilaria Matteucci and Paolo Mori and Andrea Saracino}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Enforcement of {U-XACML} History-Based Usage Control Policy}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {64--81}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_5}, doi = {10.1007/978-3-319-46598-2\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MartinelliMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MeoR016, author = {Federico De Meo and Marco Rocchetto and Luca Vigan{\`{o}}}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL} Injection}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {179--195}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_13}, doi = {10.1007/978-3-319-46598-2\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MeoR016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RathNZ16, author = {Christof Rath and Thomas Niedermair and Thomas Zefferer}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Towards a Personal Security Device}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {1--16}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_1}, doi = {10.1007/978-3-319-46598-2\_1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RathNZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RiosGL16, author = {Ruben Rios and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Privacy-Aware Trust Negotiation}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {98--105}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_7}, doi = {10.1007/978-3-319-46598-2\_7}, timestamp = {Thu, 06 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RiosGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RushananRR16, author = {Michael Rushanan and David Russell and Aviel D. Rubin}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {196--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_14}, doi = {10.1007/978-3-319-46598-2\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RushananRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SayahCTH16, author = {Tarek Sayah and Emmanuel Coquery and Romuald Thion and Mohand{-}Sa{\"{\i}}d Hacid}, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Access Control Enforcement for Selective Disclosure of Linked Data}, booktitle = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, pages = {47--63}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2\_4}, doi = {10.1007/978-3-319-46598-2\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SayahCTH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2016, editor = {Gilles Barthe and Evangelos P. Markatos and Pierangela Samarati}, title = {Security and Trust Management - 12th International Workshop, {STM} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9871}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46598-2}, doi = {10.1007/978-3-319-46598-2}, isbn = {978-3-319-46597-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AbedCL15, author = {Amr S. Abed and Charles Clancy and David S. Levy}, editor = {Sara Foresti}, title = {Intrusion Detection System for Applications Using Linux Containers}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {123--135}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_8}, doi = {10.1007/978-3-319-24858-5\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/AbedCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BrozM15, author = {Milan Broz and Vashek Maty{\'{a}}s}, editor = {Sara Foresti}, title = {Selecting a New Key Derivation Function for Disk Encryption}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {185--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_12}, doi = {10.1007/978-3-319-24858-5\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BrozM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CramptonW15, author = {Jason Crampton and Conrad Williams}, editor = {Sara Foresti}, title = {Obligations in PTaCL}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {220--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_14}, doi = {10.1007/978-3-319-24858-5\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CramptonW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FerreiraHKL15, author = {Ana Ferreira and Jean{-}Louis Huynen and Vincent Koenig and Gabriele Lenzini}, editor = {Sara Foresti}, title = {In Cyber-Space No One Can Hear You S{\(\cdot\)}CREAM - {A} Root Cause Analysis for Socio-Technical Security}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {255--264}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_16}, doi = {10.1007/978-3-319-24858-5\_16}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/FerreiraHKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GaleaV15, author = {John Galea and Mark Vella}, editor = {Sara Foresti}, title = {{SUDUTA:} Script {UAF} Detection Using Taint Analysis}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {136--151}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_9}, doi = {10.1007/978-3-319-24858-5\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GaleaV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KanstrenE15, author = {Teemu Kanstr{\'{e}}n and Antti Evesti}, editor = {Sara Foresti}, title = {Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {37--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_3}, doi = {10.1007/978-3-319-24858-5\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KanstrenE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KarafiliNN15, author = {Erisa Karafili and Hanne Riis Nielson and Flemming Nielson}, editor = {Sara Foresti}, title = {How to Trust the Re-use of Data}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {72--88}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_5}, doi = {10.1007/978-3-319-24858-5\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KarafiliNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LavyginaRD15, author = {Anna Lavygina and Alessandra Russo and Naranker Dulay}, editor = {Sara Foresti}, title = {Integrating Privacy and Safety Criteria into Planning Tasks}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {20--36}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_2}, doi = {10.1007/978-3-319-24858-5\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LavyginaRD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MannL15, author = {Christopher Mann and Daniel Loebenberger}, editor = {Sara Foresti}, title = {Two-Factor Authentication for the Bitcoin Protocol}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {155--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_10}, doi = {10.1007/978-3-319-24858-5\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MannL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MasellisGR15, author = {Riccardo De Masellis and Chiara Ghidini and Silvio Ranise}, editor = {Sara Foresti}, title = {A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {55--71}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_4}, doi = {10.1007/978-3-319-24858-5\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MasellisGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OgawaHI15, author = {Kazuto Ogawa and Goichiro Hanaoka and Hideki Imai}, editor = {Sara Foresti}, title = {Content and Key Management to Trace Traitors in Broadcasting Services}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {236--252}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_15}, doi = {10.1007/978-3-319-24858-5\_15}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/OgawaHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PandeyH15, author = {Pankaj Pandey and Steven De Haes}, editor = {Sara Foresti}, title = {Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {283--292}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_19}, doi = {10.1007/978-3-319-24858-5\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/PandeyH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PatsakisKB15, author = {Constantinos Patsakis and Panayiotis Kotzanikolaou and M{\'{e}}lanie Bouroche}, editor = {Sara Foresti}, title = {Private Proximity Testing on Steroids: An NTRU-based Protocol}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {172--184}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_11}, doi = {10.1007/978-3-319-24858-5\_11}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/PatsakisKB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PuglieseRP15, author = {Andrea Pugliese and Antonino Rullo and Antonio Piccolo}, editor = {Sara Foresti}, title = {The AC-Index: Fast Online Detection of Correlated Alerts}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {107--122}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_7}, doi = {10.1007/978-3-319-24858-5\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/PuglieseRP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RyutovOBW15, author = {Tatyana Ryutov and Michael D. Orosz and James Blythe and Detlof von Winterfeldt}, editor = {Sara Foresti}, title = {A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {274--282}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_18}, doi = {10.1007/978-3-319-24858-5\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RyutovOBW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SheikhalishahiS15, author = {Mina Sheikhalishahi and Andrea Saracino and Mohamed Mejri and Nadia Tawbi and Fabio Martinelli}, editor = {Sara Foresti}, title = {Digital Waste Sorting: {A} Goal-Based, Self-Learning Approach to Label Spam Email Campaigns}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {3--19}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_1}, doi = {10.1007/978-3-319-24858-5\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SheikhalishahiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/VolkamerRKE15, author = {Melanie Volkamer and Karen Renaud and Oksana Kulyk and Sinem Emer{\"{o}}z}, editor = {Sara Foresti}, title = {A Socio-Technical Investigation into Smartphone Security}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {265--273}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_17}, doi = {10.1007/978-3-319-24858-5\_17}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/VolkamerRKE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/WayeBKCR15, author = {Lucas Waye and Pablo Buiras and Dan King and Stephen Chong and Alejandro Russo}, editor = {Sara Foresti}, title = {It's My Privilege: Controlling Downgrading in DC-Labels}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {203--219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_13}, doi = {10.1007/978-3-319-24858-5\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/WayeBKCR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ZimmermannN15, author = {Christian Zimmermann and Claus{-}Georg Nolte}, editor = {Sara Foresti}, title = {Towards Balancing Privacy and Efficiency: {A} Principal-Agent Model of Data-Centric Business}, booktitle = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, pages = {89--104}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5\_6}, doi = {10.1007/978-3-319-24858-5\_6}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/ZimmermannN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2015, editor = {Sara Foresti}, title = {Security and Trust Management - 11th International Workshop, {STM} 2015, Vienna, Austria, September 21-22, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9331}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24858-5}, doi = {10.1007/978-3-319-24858-5}, isbn = {978-3-319-24857-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AlagarW14, author = {Vangalur S. Alagar and Kaiyu Wan}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {1--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_1}, doi = {10.1007/978-3-319-11851-2\_1}, timestamp = {Thu, 23 Sep 2021 11:47:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/AlagarW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AliF14, author = {Asad Ali and Maribel Fern{\'{a}}ndez}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Hybrid Enforcement of Category-Based Access Control}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {178--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_12}, doi = {10.1007/978-3-319-11851-2\_12}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/AliF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AntignacM14, author = {Thibaud Antignac and Daniel Le M{\'{e}}tayer}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Privacy Architectures: Reasoning about Data Minimisation and Integrity}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {17--32}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_2}, doi = {10.1007/978-3-319-11851-2\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AntignacM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BackesGK14, author = {Michael Backes and Niklas Grimm and Aniket Kate}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Lime: Data Lineage in the Malicious Environment}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {183--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_13}, doi = {10.1007/978-3-319-11851-2\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BackesGK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BamertDWW14, author = {Tobias Bamert and Christian Decker and Roger Wattenhofer and Samuel Welten}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {BlueWallet: The Secure Bitcoin Wallet}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {65--80}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_5}, doi = {10.1007/978-3-319-11851-2\_5}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BamertDWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CanovaVBB14, author = {Gamze Canova and Melanie Volkamer and Clemens Bergmann and Roland Borza}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {NoPhish: An Anti-Phishing Education App}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {188--192}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_14}, doi = {10.1007/978-3-319-11851-2\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CanovaVBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CramptonM14, author = {Jason Crampton and Charles Morisset}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Monotonicity and Completeness in Attribute-Based Access Control}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {33--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_3}, doi = {10.1007/978-3-319-11851-2\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CramptonM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CramptonS14, author = {Jason Crampton and James Sellwood}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Caching and Auditing in the {RPPM} Model}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {49--64}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_4}, doi = {10.1007/978-3-319-11851-2\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CramptonS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Dimovski14, author = {Aleksandar S. Dimovski}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Ensuring Secure Non-interference of Programs by Game Semantics}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {81--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_6}, doi = {10.1007/978-3-319-11851-2\_6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Dimovski14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JurneckaSM14, author = {Filip Jurnecka and Martin Stehl{\'{\i}}k and Vashek Matyas}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Evaluation of Key Management Schemes in Wireless Sensor Networks}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {198--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_16}, doi = {10.1007/978-3-319-11851-2\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JurneckaSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LazouskiMMS14, author = {Aliaksandr Lazouski and Fabio Martinelli and Paolo Mori and Andrea Saracino}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Stateful Usage Control for Android Mobile Devices}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {97--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_7}, doi = {10.1007/978-3-319-11851-2\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LazouskiMMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Modesti14, author = {Paolo Modesti}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {204--208}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_17}, doi = {10.1007/978-3-319-11851-2\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Modesti14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MorissetYGM14, author = {Charles Morisset and Iryna Yevseyeva and Thomas Gro{\ss} and Aad P. A. van Moorsel}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {A Formal Model for Soft Enforcement: Influencing the Decision-Maker}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {113--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_8}, doi = {10.1007/978-3-319-11851-2\_8}, timestamp = {Tue, 12 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/MorissetYGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PandeyS14, author = {Pankaj Pandey and Einar Arthur Snekkenes}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Using Prediction Markets to Hedge Information Security Risks}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {129--145}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_9}, doi = {10.1007/978-3-319-11851-2\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/PandeyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaniseT14, author = {Silvio Ranise and Riccardo Traverso}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {{ALPS:} An Action Language for Policy Specification and Automated Safety Analysis}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {146--161}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_10}, doi = {10.1007/978-3-319-11851-2\_10}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaniseT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SantiagoEMM14, author = {Sonia Santiago and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {162--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_11}, doi = {10.1007/978-3-319-11851-2\_11}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SantiagoEMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/TormoMP14, author = {Gin{\'{e}}s D{\'{o}}lera Tormo and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {{ROMEO:} ReputatiOn Model Enhancing OpenID Simulator}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {193--197}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_15}, doi = {10.1007/978-3-319-11851-2\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/TormoMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2014, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2}, doi = {10.1007/978-3-319-11851-2}, isbn = {978-3-319-11850-5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BenedictisKAC13, author = {Alessandra De Benedictis and Behzad Koosha and Massimiliano Albanese and Valentina Casola}, editor = {Rafael Accorsi and Silvio Ranise}, title = {A Probabilistic Framework for Distributed Localization of Attackers in MANETs}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {49--64}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_4}, doi = {10.1007/978-3-642-41098-7\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BenedictisKAC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BottaCP13, author = {Marco Botta and Davide Cavagnino and Victor Pomponiu}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Weighted-Sum Fragile Watermarking in the Karhunen-Lo{\`{e}}ve Domain}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {223--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_15}, doi = {10.1007/978-3-642-41098-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BottaCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ContiDG13, author = {Mauro Conti and Nicola Dragoni and Sebastiano Gottardo}, editor = {Rafael Accorsi and Silvio Ranise}, title = {{MITHYS:} Mind The Hand You Shake - Protecting Mobile Devices from {SSL} Usage Vulnerabilities}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {65--81}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_5}, doi = {10.1007/978-3-642-41098-7\_5}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/ContiDG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DelakouridisA13, author = {Costas Delakouridis and Christos Anagnostopoulos}, editor = {Rafael Accorsi and Silvio Ranise}, title = {On Enhancement of 'Share The Secret' Scheme for Location Privacy}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_1}, doi = {10.1007/978-3-642-41098-7\_1}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DelakouridisA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FerreiraHKLR13, author = {Ana Ferreira and Jean{-}Louis Huynen and Vincent Koenig and Gabriele Lenzini and Salvador Rivas}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {131--143}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_9}, doi = {10.1007/978-3-642-41098-7\_9}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/FerreiraHKLR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Franco-ContrerasCCCR13, author = {Javier Franco{-}Contreras and Gouenou Coatrieux and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Christian Roux}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {207--222}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_14}, doi = {10.1007/978-3-642-41098-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Franco-ContrerasCCCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KoslowskiZ13, author = {Thomas G. Koslowski and Christian Zimmermann}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Towards a Detective Approach to Process-Centered Resilience}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {176--190}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_12}, doi = {10.1007/978-3-642-41098-7\_12}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/KoslowskiZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/LaudP13, author = {Peeter Laud and Alisa Pankova}, editor = {Rafael Accorsi and Silvio Ranise}, title = {New Attacks against Transformation-Based Privacy-Preserving Linear Programming}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {17--32}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_2}, doi = {10.1007/978-3-642-41098-7\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/LaudP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MalliosBKMM13, author = {Yannis Mallios and Lujo Bauer and Dilsun Kirli Kaynar and Fabio Martinelli and Charles Morisset}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Probabilistic Cost Enforcement of Security Policies}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {144--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_10}, doi = {10.1007/978-3-642-41098-7\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MalliosBKMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MylonasTG13, author = {Alexios Mylonas and Nikolaos Tsalis and Dimitris Gritzalis}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Evaluating the Manageability of Web Browsers Controls}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {82--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_6}, doi = {10.1007/978-3-642-41098-7\_6}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/MylonasTG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RileyCM13, author = {Ryan D. Riley and Chris Clifton and Qutaibah M. Malluhi}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Maintaining Database Anonymity in the Presence of Queries}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {33--48}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_3}, doi = {10.1007/978-3-642-41098-7\_3}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RileyCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RocchettoVVV13, author = {Marco Rocchetto and Luca Vigan{\`{o}} and Marco Volpe and Giacomo Dalle Vedove}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Using Interpolation for the Verification of Security Protocols}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {99--114}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_7}, doi = {10.1007/978-3-642-41098-7\_7}, timestamp = {Fri, 08 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RocchettoVVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Rodriguez-HenriquezC13, author = {Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Debrup Chakraborty}, editor = {Rafael Accorsi and Silvio Ranise}, title = {{RDAS:} {A} Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {115--130}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_8}, doi = {10.1007/978-3-642-41098-7\_8}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Rodriguez-HenriquezC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/StockerB13, author = {Thomas Stocker and Frank B{\"{o}}hr}, editor = {Rafael Accorsi and Silvio Ranise}, title = {IF-Net: {A} Meta-Model for Security-Oriented Process Specification}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {191--206}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_13}, doi = {10.1007/978-3-642-41098-7\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/StockerB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SultanaBK13, author = {Nik Sultana and Moritz Y. Becker and Markulf Kohlweiss}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Selective Disclosure in Datalog-Based Trust Management}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {160--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_11}, doi = {10.1007/978-3-642-41098-7\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SultanaBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2012, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38004-4}, doi = {10.1007/978-3-642-38004-4}, isbn = {978-3-642-38003-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2013, editor = {Rafael Accorsi and Silvio Ranise}, title = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7}, doi = {10.1007/978-3-642-41098-7}, isbn = {978-3-642-41097-0}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BarlettaRV12, author = {Michele Barletta and Silvio Ranise and Luca Vigan{\`{o}}}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {49--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_4}, doi = {10.1007/978-3-642-38004-4\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BarlettaRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BlundoC12, author = {Carlo Blundo and Stelvio Cimato}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Constrained Role Mining}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {289--304}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_19}, doi = {10.1007/978-3-642-38004-4\_19}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BlundoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CaravagnaCP12, author = {Giulio Caravagna and Gabriele Costa and Giovanni Pardini}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Lazy Security Controllers}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {33--48}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_3}, doi = {10.1007/978-3-642-38004-4\_3}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CaravagnaCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DelftBS12, author = {Bart van Delft and Niklas Broberg and David Sands}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A Datalog Semantics for Paralocks}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {305--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_20}, doi = {10.1007/978-3-642-38004-4\_20}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DelftBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DrabikMM12, author = {Peter Dr{\'{a}}bik and Fabio Martinelli and Charles Morisset}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Cost-Aware Runtime Enforcement of Security Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_1}, doi = {10.1007/978-3-642-38004-4\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DrabikMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DumasH12, author = {Jean{-}Guillaume Dumas and Hicham Hossayni}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {129--144}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_9}, doi = {10.1007/978-3-642-38004-4\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DumasH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FrauD12, author = {Simone Frau and Mohammad Torabi Dashti}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Analysis of Communicating Authorization Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {97--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_7}, doi = {10.1007/978-3-642-38004-4\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/FrauD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GenoveseGR12, author = {Valerio Genovese and Deepak Garg and Daniele Rispoli}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Labeled Goal-Directed Search in Access Control Logic}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {65--80}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_5}, doi = {10.1007/978-3-642-38004-4\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GenoveseGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GevaH12, author = {Moti Geva and Amir Herzberg}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {{DOT-COM:} Decentralized Online Trading and COMmerce}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {177--192}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_12}, doi = {10.1007/978-3-642-38004-4\_12}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GevaH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrompanopoulosGM12, author = {Christos Grompanopoulos and Antonios Gouglidis and Ioannis Mavridis}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A Use-Based Approach for Enhancing {UCON}}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {81--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_6}, doi = {10.1007/978-3-642-38004-4\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrompanopoulosGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrootBLLV12, author = {Joep A. de Groot and Vinh T. Bui and Jean{-}Paul M. G. Linnartz and Johan Lukkien and Richard Verhoeven}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Software Authentication to Enhance Trust in Body Sensor Networks}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {241--256}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_16}, doi = {10.1007/978-3-642-38004-4\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrootBLLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KunnemannS12, author = {Robert K{\"{u}}nnemann and Graham Steel}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {257--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_17}, doi = {10.1007/978-3-642-38004-4\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KunnemannS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MalliosBKL12, author = {Yannis Mallios and Lujo Bauer and Dilsun Kirli Kaynar and Jay Ligatti}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {17--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_2}, doi = {10.1007/978-3-642-38004-4\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MalliosBKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MauwP12, author = {Sjouke Mauw and Selwyn Piramuthu}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {209--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_14}, doi = {10.1007/978-3-642-38004-4\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MauwP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MeadowsP12, author = {Catherine Meadows and Dusko Pavlovic}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formalizing Physical Security Procedures}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {193--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_13}, doi = {10.1007/978-3-642-38004-4\_13}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MeadowsP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MoyanoGL12, author = {Francisco Moyano and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Building Trust and Reputation In: {A} Development Framework for Trust Models Implementation}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {113--128}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_8}, doi = {10.1007/978-3-642-38004-4\_8}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/MoyanoGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NazzicariASJ12, author = {Nelson Nazzicari and Javier Almillategui and Angelos Stavrou and Sushil Jajodia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_11}, doi = {10.1007/978-3-642-38004-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OhrimenkoRT12, author = {Olga Ohrimenko and Hobart Reynolds and Roberto Tamassia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Authenticating Email Search Results}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {225--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_15}, doi = {10.1007/978-3-642-38004-4\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/OhrimenkoRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaniseTA12, author = {Silvio Ranise and Anh Tuan Truong and Alessandro Armando}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Boosting Model Checking to Analyse Large {ARBAC} Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {273--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_18}, doi = {10.1007/978-3-642-38004-4\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaniseTA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/VeeningenWZ12, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formal Modelling of (De)Pseudonymisation: {A} Case Study in Health Care Privacy}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {145--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_10}, doi = {10.1007/978-3-642-38004-4\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/VeeningenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2011, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29963-6}, doi = {10.1007/978-3-642-29963-6}, isbn = {978-3-642-29962-9}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ArmandoR11, author = {Alessandro Armando and Silvio Ranise}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Automated Analysis of Infinite State Workflows with Access Control Policies}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {157--174}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_12}, doi = {10.1007/978-3-642-29963-6\_12}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/stm/ArmandoR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ChenC11, author = {Liang Chen and Jason Crampton}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Risk-Aware Role-Based Access Control}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {140--156}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_11}, doi = {10.1007/978-3-642-29963-6\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ChenC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GenoveseG11, author = {Valerio Genovese and Deepak Garg}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {New Modalities for Access Control Logics: Permission, Control and Ratification}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {56--71}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_6}, doi = {10.1007/978-3-642-29963-6\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GenoveseG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrevelerJL11, author = {Ulrich Greveler and Benjamin Justus and Dennis L{\"{o}}hr}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Mutual Remote Attestation: Enabling System Cloning for {TPM} Based Platforms}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {193--206}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_14}, doi = {10.1007/978-3-642-29963-6\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrevelerJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/JamrogaMM11, author = {Wojciech Jamroga and Sjouke Mauw and Matthijs Melissen}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Fairness in Non-Repudiation Protocols}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {122--139}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_10}, doi = {10.1007/978-3-642-29963-6\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/JamrogaMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Josang11, author = {Audun J{\o}sang}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Trust Extortion on the Internet}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {6--21}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_2}, doi = {10.1007/978-3-642-29963-6\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Josang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MarshNSWBRSEEBDCS11, author = {Stephen Marsh and Sylvie No{\"{e}}l and Tim Storer and Yao Wang and Pamela Briggs and Lewis Robart and John A. Stewart and Babak Esfandiari and Khalil El{-}Khatib and Mehmet Vefa Bicakci and Manh Cuong Dao and Michael Cohen and Daniel Da Silva}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {28--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_4}, doi = {10.1007/978-3-642-29963-6\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MarshNSWBRSEEBDCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MorgensternGP11, author = {Jamie Morgenstern and Deepak Garg and Frank Pfenning}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {A Proof-Carrying File System with Revocable and Use-Once Certificates}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {40--55}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_5}, doi = {10.1007/978-3-642-29963-6\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MorgensternGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MullerK11, author = {Sascha M{\"{u}}ller and Stefan Katzenbeisser}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Hiding the Policy in Cryptographic Access Control}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {90--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_8}, doi = {10.1007/978-3-642-29963-6\_8}, timestamp = {Thu, 20 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MullerK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NajeraRL11, author = {Pablo Najera and Rodrigo Roman and Javier L{\'{o}}pez}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Secure Architecure for the Integration of {RFID} and Sensors in Personal Networks}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {207--222}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_15}, doi = {10.1007/978-3-642-29963-6\_15}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/NajeraRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/PohlsH11, author = {Henrich Christopher P{\"{o}}hls and Focke H{\"{o}}hne}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {The Role of Data Integrity in {EU} Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {175--192}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_13}, doi = {10.1007/978-3-642-29963-6\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/PohlsH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RahmanCG11, author = {Syed Sadiqur Rahman and Sadie Creese and Michael Goldsmith}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {223--238}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_16}, doi = {10.1007/978-3-642-29963-6\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RahmanCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RechertG11, author = {Klaus Rechert and Benjamin Greschbach}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Location Privacy in Relation to Trusted Peers}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {106--121}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_9}, doi = {10.1007/978-3-642-29963-6\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RechertG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Rudolph11, author = {Carsten Rudolph}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Trust Areas: {A} Security Paradigm for the Future Internet}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {22--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_3}, doi = {10.1007/978-3-642-29963-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Rudolph11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Sarier11, author = {Neyire Deniz Sarier}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Security Notions of Biometric Remote Authentication Revisited}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {72--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_7}, doi = {10.1007/978-3-642-29963-6\_7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Sarier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SolhaugS11, author = {Bj{\o}rnar Solhaug and Ketil St{\o}len}, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Uncertainty, Subjectivity, Trust and Risk: How It All Fits together}, booktitle = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, pages = {1--5}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29963-6\_1}, doi = {10.1007/978-3-642-29963-6\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SolhaugS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2010, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22444-7}, doi = {10.1007/978-3-642-22444-7}, isbn = {978-3-642-22443-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AccorsiW10, author = {Rafael Accorsi and Claus Wonnemann}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {194--209}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_13}, doi = {10.1007/978-3-642-22444-7\_13}, timestamp = {Tue, 07 May 2024 20:13:56 +0200}, biburl = {https://dblp.org/rec/conf/stm/AccorsiW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/AkgunC10, author = {Mete Akg{\"{u}}n and Mehmet Ufuk {\c{C}}aglayan}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Extending an {RFID} Security and Privacy Model by Considering Forward Untraceability}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {239--254}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_16}, doi = {10.1007/978-3-642-22444-7\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/AkgunC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/ArmandoR10, author = {Alessandro Armando and Silvio Ranise}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Automated Symbolic Analysis of ARBAC-Policies}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {17--34}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_2}, doi = {10.1007/978-3-642-22444-7\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/ArmandoR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BasedM10, author = {Md. Abdul Based and Stig Fr. Mj{\o}lsnes}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Universally Composable {NIZK} Protocol in an Internet Voting Scheme}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {147--162}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_10}, doi = {10.1007/978-3-642-22444-7\_10}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BasedM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BertolissiF10, author = {Clara Bertolissi and Maribel Fern{\'{a}}ndez}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Rewrite Specifications of Access Control Policies in Distributed Environments}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {51--67}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_4}, doi = {10.1007/978-3-642-22444-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BertolissiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BezziVLS10, author = {Michele Bezzi and Sabrina De Capitani di Vimercati and Giovanni Livraga and Pierangela Samarati}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Protecting Privacy of Sensitive Value Distributions in Data Release}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {255--270}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_17}, doi = {10.1007/978-3-642-22444-7\_17}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BezziVLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CramptonM10, author = {Jason Crampton and Charles Morisset}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {An Auto-delegation Mechanism for Access Control Systems}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {1--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_1}, doi = {10.1007/978-3-642-22444-7\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CramptonM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DionysiouGB10, author = {Ioanna Dionysiou and K. Harald Gjermundr{\o}d and David E. Bakken}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {{GUTS:} {A} Framework for Adaptive and Configureable Grid User Trust Service}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {84--99}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_6}, doi = {10.1007/978-3-642-22444-7\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/DionysiouGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FoleyAO10, author = {Simon N. Foley and Wayne Mac Adams and Barry O'Sullivan}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {100--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_7}, doi = {10.1007/978-3-642-22444-7\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/FoleyAO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GarciaJ10, author = {Flavio D. Garcia and Bart Jacobs}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Privacy-Friendly Energy-Metering via Homomorphic Encryption}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {226--238}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_15}, doi = {10.1007/978-3-642-22444-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GarciaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GargP10, author = {Deepak Garg and Frank Pfenning}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Stateful Authorization Logic: - Proof Theory and a Case Study}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {210--225}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_14}, doi = {10.1007/978-3-642-22444-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GargP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/Gomi10, author = {Hidehito Gomi}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {An Authentication Trust Metric for Federated Identity Management Systems}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {116--131}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_8}, doi = {10.1007/978-3-642-22444-7\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/Gomi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/HartmannMOR10, author = {Peter Hartmann and Monika Maidl and David von Oheimb and Richard Robinson}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {68--83}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_5}, doi = {10.1007/978-3-642-22444-7\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/HartmannMOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KrautsevichLMY10, author = {Leanid Krautsevich and Aliaksandr Lazouski and Fabio Martinelli and Artsiom Yautsiukhin}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Influence of Attribute Freshness on Decision Making in Usage Control}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {35--50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_3}, doi = {10.1007/978-3-642-22444-7\_3}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KrautsevichLMY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SarrouhENS10, author = {Nadim Sarrouh and Florian Eilers and Uwe Nestmann and Ina Schieferdecker}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Defamation-Free Networks through User-Centered Data Control}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {179--193}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_12}, doi = {10.1007/978-3-642-22444-7\_12}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SarrouhENS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SasseEMM10, author = {Ralf Sasse and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {Protocol Analysis Modulo Combination of Theories: {A} Case Study in Maude-NPA}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {163--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_11}, doi = {10.1007/978-3-642-22444-7\_11}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SasseEMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SunZPAM10, author = {Yanjie Sun and Chenyi Zhang and Jun Pang and Baptiste Alcalde and Sjouke Mauw}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner and Javier L{\'{o}}pez}, title = {A Trust-Augmented Voting Scheme for Collaborative Privacy Management}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {132--146}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_9}, doi = {10.1007/978-3-642-22444-7\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SunZPAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2008, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, publisher = {Elsevier}, year = {2009}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/244/suppl/C}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AgudoGL09, author = {Isaac Agudo and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {An Evolutionary Trust and Distrust Model}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {3--12}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.034}, doi = {10.1016/J.ENTCS.2009.07.034}, timestamp = {Thu, 09 Mar 2023 13:54:01 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AgudoGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AzzedinR09, author = {Farag Azzedin and Ahmad Ridha}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Recommendation Retrieval in Reputation Assessment for Peer-to-Peer Systems}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {13--25}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.035}, doi = {10.1016/J.ENTCS.2009.07.035}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AzzedinR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BusnelKLSZ09, author = {Pierre Busnel and Paul El Khoury and Keqin Li and Ayda Sa{\"{\i}}dane and Nicola Zannone}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {S{\&}D Pattern Deployment at Organizational Level: {A} Prototype for Remote Healthcare System}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {27--39}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.036}, doi = {10.1016/J.ENTCS.2009.07.036}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BusnelKLSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Security of {RFID} Protocols - {A} Case Study}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {41--52}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.037}, doi = {10.1016/J.ENTCS.2009.07.037}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DimitrakosM09, author = {Theodosis Dimitrakos and Fabio Martinelli}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Preface}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {1--2}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.033}, doi = {10.1016/J.ENTCS.2009.07.033}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DimitrakosM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/FaisCL09, author = {Davide Fais and Maurizio Colombo and Aliaksandr Lazouski}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {53--65}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.038}, doi = {10.1016/J.ENTCS.2009.07.038}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/FaisCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Gutscher09, author = {Andreas Gutscher}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Reasoning with Uncertain and Conflicting Opinions in Open Reputation Systems}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {67--79}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.039}, doi = {10.1016/J.ENTCS.2009.07.039}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Gutscher09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KorsgaardJ09, author = {Thomas Rune Korsgaard and Christian Damsgaard Jensen}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Reengineering the Wikipedia for Reputation}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {81--94}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.040}, doi = {10.1016/J.ENTCS.2009.07.040}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/KorsgaardJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Moe09, author = {Marie Elisabeth Gaup Moe}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Quantification of Anonymity for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {95--107}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.041}, doi = {10.1016/J.ENTCS.2009.07.041}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Moe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/PretschnerSSW09, author = {Alexander Pretschner and Florian Sch{\"{u}}tz and Christian Schaefer and Thomas Walter}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Policy Evolution in Distributed Usage Control}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {109--123}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.042}, doi = {10.1016/J.ENTCS.2009.07.042}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/PretschnerSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/TatliL09, author = {Emin Islam Tatli and Stefan Lucks}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Mobile Identity Management Revisited}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {125--137}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.044}, doi = {10.1016/J.ENTCS.2009.07.044}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/TatliL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/TavakolifardK09, author = {Mozhgan Tavakolifard and Svein J. Knapskog}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments}, booktitle = {Proceedings of the 4th International Workshop on Security and Trust Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {244}, pages = {139--149}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.07.043}, doi = {10.1016/J.ENTCS.2009.07.043}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/TavakolifardK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2007, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, publisher = {Elsevier}, year = {2008}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/197/issue/2}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AndelY08, author = {Todd R. Andel and Alec Yasinsac}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {3--14}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.013}, doi = {10.1016/J.ENTCS.2007.12.013}, timestamp = {Mon, 13 Feb 2023 09:13:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AndelY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArenasABM08, author = {Alvaro Arenas and Benjamin Aziz and Juan Bicarregui and Brian Matthews}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Managing Conflicts of Interest in Virtual Organisations}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {45--56}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.016}, doi = {10.1016/J.ENTCS.2007.12.016}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArenasABM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BassoM08, author = {Alessandro Basso and Michele Miraglia}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Avoiding Massive Automated Voting in Internet Polls}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {149--157}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.024}, doi = {10.1016/J.ENTCS.2007.12.024}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BassoM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BhaskarCLMVY08, author = {Raghav Bhaskar and K. Chandrasekaran and Satyanarayana V. Lokam and Peter L. Montgomery and Ramarathnam Venkatesan and Yacov Yacobi}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Vulnerabilities in Anonymous Credential Systems}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {141--148}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.023}, doi = {10.1016/J.ENTCS.2007.12.023}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BhaskarCLMVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BianchiBFPT08, author = {Giuseppe Bianchi and Marco Bonola and Vincenzo Falletta and Francesco Saverio Proto and Simone Teofili}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {The {SPARTA} Pseudonym and Authorization System}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {57--71}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.017}, doi = {10.1016/J.ENTCS.2007.12.017}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BianchiBFPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BiskupHW08, author = {Joachim Biskup and Julia Hielscher and Sandra Wortmann}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {A Trust- and Property-based Access Control Model}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {169--177}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.026}, doi = {10.1016/J.ENTCS.2007.12.026}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BiskupHW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BistarelliPT08, author = {Stefano Bistarelli and Pamela Peretti and Irina Trubitsyna}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Analyzing Security Scenarios Using Defence Trees and Answer Set Programming}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {121--129}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.021}, doi = {10.1016/J.ENTCS.2007.12.021}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BistarelliPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CeelenMR08, author = {Pieter Ceelen and Sjouke Mauw and Sasa Radomirovic}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {31--43}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.015}, doi = {10.1016/J.ENTCS.2007.12.015}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CompagnaLM08, author = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Preface}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {1--2}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2008.01.001}, doi = {10.1016/J.ENTCS.2008.01.001}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CompagnaLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CordascoW08, author = {Jared Cordasco and Susanne Wetzel}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Cryptographic Versus Trust-based Methods for {MANET} Routing Security}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {131--140}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.022}, doi = {10.1016/J.ENTCS.2007.12.022}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CordascoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DeursenKP08, author = {Ton van Deursen and R. Paul Koster and Milan Petkovic}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Hedaquin: {A} Reputation-based Health Data Quality Indicator}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {159--167}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.025}, doi = {10.1016/J.ENTCS.2007.12.025}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DeursenKP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LenziniBH08, author = {Gabriele Lenzini and Mortaza S. Bargh and Bob Hulsebosch}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Trust-enhanced Security in Location-based Adaptive Authentication}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {105--119}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.020}, doi = {10.1016/J.ENTCS.2007.12.020}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/LenziniBH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/RefsdalS08, author = {Atle Refsdal and Ketil St{\o}len}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Extending {UML} Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {15--29}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.014}, doi = {10.1016/J.ENTCS.2007.12.014}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/RefsdalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Wierzbicki08, author = {Adam Wierzbicki}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {The Case for Fairness of Trust Management}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {73--89}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.018}, doi = {10.1016/J.ENTCS.2007.12.018}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Wierzbicki08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ZandbeltHBA08, author = {J. F. Zandbelt and R. J. Hulsebosch and Mortaza S. Bargh and R. Arends}, editor = {Luca Compagna and Volkmar Lotz and Fabio Massacci}, title = {Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using {DNSSEC}}, booktitle = {Proceedings of the 3rd International Workshop on Security and Trust Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {197}, number = {2}, pages = {91--103}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.12.019}, doi = {10.1016/J.ENTCS.2007.12.019}, timestamp = {Mon, 13 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ZandbeltHBA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2006, editor = {Sandro Etalle and Pierangela Samarati}, title = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, publisher = {Elsevier}, year = {2007}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/179/suppl/C}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/AdamKPS07, author = {Nabil R. Adam and Ahmet Kozanoglu and Aabhas V. Paliwal and Basit Shafiq}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Secure Information Sharing in a Virtual Multi-Agency Team Environment}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {97--109}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.034}, doi = {10.1016/J.ENTCS.2006.08.034}, timestamp = {Tue, 24 Jan 2023 13:29:56 +0100}, biburl = {https://dblp.org/rec/journals/entcs/AdamKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Androutsellis-TheotokisSV07, author = {Stephanos Androutsellis{-}Theotokis and Diomidis Spinellis and Vasileios Vlachos}, editor = {Sandro Etalle and Pierangela Samarati}, title = {The MoR-Trust Distributed Trust Management System: Design and Simulation Results}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {3--15}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.032}, doi = {10.1016/J.ENTCS.2006.11.032}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Androutsellis-TheotokisSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BelsisGK07, author = {Petros Belsis and Stefanos Gritzalis and Sokratis K. Katsikas}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {75--86}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.032}, doi = {10.1016/J.ENTCS.2006.08.032}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Degerlund07, author = {Fredrik Degerlund}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Trust Mass, Volume and Density - a Novel Approach to Reasoning about Trust}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {87--96}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.033}, doi = {10.1016/J.ENTCS.2006.08.033}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Degerlund07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DeriazS07, author = {Michel Deriaz and Jean{-}Marc Seigneur}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Towards Trustworthy Spatial Messaging}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {123--133}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.036}, doi = {10.1016/J.ENTCS.2006.08.036}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DeriazS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/EtalleS07, author = {Sandro Etalle and Pierangela Samarati}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Preface}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {1--2}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.031}, doi = {10.1016/J.ENTCS.2006.11.031}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/EtalleS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HassanMW07, author = {Mohammad Waseem Hassan and Richard McClatchey and Ian Willers}, editor = {Sandro Etalle and Pierangela Samarati}, title = {A Scalable Evidence Based Self-Managing Framework for Trust Management}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {59--73}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.031}, doi = {10.1016/J.ENTCS.2006.08.031}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/HassanMW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/KarabulutKMRY07, author = {Y{\"{u}}cel Karabulut and Florian Kerschbaum and Fabio Massacci and Philip Robinson and Artsiom Yautsiukhin}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Security and Trust in {IT} Business Outsourcing: a Manifesto}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {47--58}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.030}, doi = {10.1016/J.ENTCS.2006.08.030}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/KarabulutKMRY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LenziniTM07, author = {Gabriele Lenzini and Andrew Tokmakoff and Johan Muskens}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Managing Trustworthiness in Component-based Embedded Systems}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {143--155}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.038}, doi = {10.1016/J.ENTCS.2006.08.038}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/LenziniTM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MartinelliM07a, author = {Fabio Martinelli and Ilaria Matteucci}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Through Modeling to Synthesis of Security Automata}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {31--46}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.029}, doi = {10.1016/J.ENTCS.2006.08.029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/MartinelliM07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MjolsnesT07, author = {Stig Fr. Mj{\o}lsnes and Marius Teigen}, editor = {Sandro Etalle and Pierangela Samarati}, title = {A Survey on Trust and Privacy Negotiability in the Norwegian Mobile Telecom Market}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {135--142}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.037}, doi = {10.1016/J.ENTCS.2006.08.037}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MjolsnesT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/StrufeWS07, author = {Thorsten Strufe and Jens Wildhagen and G{\"{u}}nter Sch{\"{a}}fer}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Towards the Construction of Attack Resistant and Efficient Overlay Streaming Topologies}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {111--121}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.08.035}, doi = {10.1016/J.ENTCS.2006.08.035}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/StrufeWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/WeiM07, author = {Songjie Wei and Jelena Mirkovic}, editor = {Sandro Etalle and Pierangela Samarati}, title = {Building Reputations for Internet Clients}, booktitle = {Proceedings of the Second International Workshop on Security and Trust Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {179}, pages = {17--30}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.033}, doi = {10.1016/J.ENTCS.2006.11.033}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/WeiM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2005, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, publisher = {Elsevier}, year = {2006}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/157/issue/3}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CvrcekS06, author = {Daniel Cvrcek and Petr Svenda}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Smart Dust Security - Key Infection Revisited}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {11--25}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.043}, doi = {10.1016/J.ENTCS.2005.09.043}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CvrcekS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06, author = {Marcin Czenko and Ha Tran and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Jerry den Hartog}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Nonmonotonic Trust Management for {P2P} Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {113--130}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.037}, doi = {10.1016/J.ENTCS.2005.09.037}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DamianiVSV06, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Pierangela Samarati and Marco Viviani}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A WOWA-based Aggregation Technique on Trust Values Connected to Metadata}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {131--142}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.036}, doi = {10.1016/J.ENTCS.2005.09.036}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/DamianiVSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Gollmann06, author = {Dieter Gollmann}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Why Trust is Bad for Security}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {3--9}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.044}, doi = {10.1016/J.ENTCS.2005.09.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/Gollmann06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GorrieriMP06, author = {Roberto Gorrieri and Fabio Martinelli and Marinella Petrocchi}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A Formalization of Credit and Responsibility Within the {GNDC} Schema}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {61--78}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.040}, doi = {10.1016/J.ENTCS.2005.09.040}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GorrieriMP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GrayJOWSC06, author = {Elizabeth Gray and Christian Damsgaard Jensen and Paul O'Connell and Stefan Weber and Jean{-}Marc Seigneur and Yong Chen}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Trust Evolution Policies for Security in Collaborative Ad Hoc Applications}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {95--111}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.038}, doi = {10.1016/J.ENTCS.2005.09.038}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/GrayJOWSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MauwIC06, author = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Preface}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.045}, doi = {10.1016/J.ENTCS.2005.09.045}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MauwIC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/McDonaldY06, author = {Jeffrey Todd McDonald and Alec Yasinsac}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Application Security Models for Mobile Agent Systems}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {43--59}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.041}, doi = {10.1016/J.ENTCS.2005.09.041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/McDonaldY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/OrzanV06, author = {Simona Orzan and Erik P. de Vink}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Multiparty Contract Signing Over a Reliable Network}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {27--41}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.042}, doi = {10.1016/J.ENTCS.2005.09.042}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/OrzanV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/QuillinanF06, author = {Thomas B. Quillinan and Simon N. Foley}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {Synchronisation in Trust Management Using Push Authorisation}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {143--158}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.035}, doi = {10.1016/J.ENTCS.2005.09.035}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/QuillinanF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Schmidt-Samoa06a, author = {Katja Schmidt{-}Samoa}, editor = {Sjouke Mauw and Val{\'{e}}rie Issarny and Cas Cremers}, title = {A New Rabin-type Trapdoor Permutation Equivalent to Factoring}, booktitle = {Proceedings of the First International Workshop on Security and Trust Management, {STM} 2005, Milan, Italy, September 15, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {157}, number = {3}, pages = {79--94}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.09.039}, doi = {10.1016/J.ENTCS.2005.09.039}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Schmidt-Samoa06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.