Search dblp for Publications

export results for "stream:streams/conf/stm:"

 download as .bib file

@inproceedings{DBLP:conf/stm/AmorimBMP23,
  author       = {Ivone Amorim and
                  Pedro Barbosa and
                  Eva Maia and
                  Isabel Pra{\c{c}}a},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Privacy-Preserving {NN} for {IDS:} {A} Study on the Impact of {TFHE}
                  Restrictions},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {107--125},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_7},
  doi          = {10.1007/978-3-031-47198-8\_7},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/AmorimBMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Botes23,
  author       = {Marietjie Botes},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Consent as Mechanism to Preserve Information Privacy: Its Origin,
                  Evolution, and Current Relevance},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {136--145},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_9},
  doi          = {10.1007/978-3-031-47198-8\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Botes23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HilbigSL23,
  author       = {Tobias Hilbig and
                  Thomas Schreck and
                  Tobias Limmer},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {'State of the Union': Evaluating Open Source Zero Trust Components},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_3},
  doi          = {10.1007/978-3-031-47198-8\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/HilbigSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JeyakumarWR23,
  author       = {Isaac Henderson Johnson Jeyakumar and
                  John Walker and
                  Heiko Ro{\ss}nagel},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Decentralized Global Trust Registry Platform for Trust Discovery and
                  Verification of e-Health Credentials Using {TRAIN:} {COVID-19} Certificate
                  Use Case},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {95--104},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_6},
  doi          = {10.1007/978-3-031-47198-8\_6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/JeyakumarWR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KolesnichenkoPCOS23,
  author       = {Pavel V. Kolesnichenko and
                  Dmytro Progonov and
                  Valentyna Cherniakova and
                  Andriy Oliynyk and
                  Oleksandra Sokol},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Biometric-Based Password Management},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_2},
  doi          = {10.1007/978-3-031-47198-8\_2},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KolesnichenkoPCOS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NazarenkoKGK23,
  author       = {Emiliia Nazarenko and
                  Felix Klement and
                  Eva Gr{\"{u}}ndinger and
                  Stefan Katzenbeisser},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet
                  of Things},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_4},
  doi          = {10.1007/978-3-031-47198-8\_4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/NazarenkoKGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Ouaili23,
  author       = {Lydia Ouaili},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Impact of Consensus Protocols on the Efficiency of Registration and
                  Authentication Process in Self-sovereign Identity},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_1},
  doi          = {10.1007/978-3-031-47198-8\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Ouaili23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Pohls23,
  author       = {Henrich C. P{\"{o}}hls},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Towards a Unified Abstract Architecture to Coherently and Generically
                  Describe Security Goals and Risks of {AI} Systems},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {85--94},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_5},
  doi          = {10.1007/978-3-031-47198-8\_5},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Pohls23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Willemson23,
  author       = {Jan Willemson},
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Analyzing and Improving Eligibility Verifiability of the Proposed
                  Belgian Remote Voting System},
  booktitle    = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  pages        = {126--135},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8\_8},
  doi          = {10.1007/978-3-031-47198-8\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Willemson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2022,
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29504-1},
  doi          = {10.1007/978-3-031-29504-1},
  isbn         = {978-3-031-29503-4},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2023,
  editor       = {Ruben Rios and
                  Joachim Posegga},
  title        = {Security and Trust Management - 19th International Workshop, {STM}
                  2023, The Hague, The Netherlands, September 28, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14336},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47198-8},
  doi          = {10.1007/978-3-031-47198-8},
  isbn         = {978-3-031-47197-1},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Botes22,
  author       = {Marietjie Botes},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {The Relevance of Consent in the Digital Age: {A} Consideration of
                  Its Origins and Its Fit for Digital Application},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {177--188},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_10},
  doi          = {10.1007/978-3-031-29504-1\_10},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Botes22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BuccioliCVNBBLL22,
  author       = {Luca Buccioli and
                  Stefano Cristalli and
                  Edoardo Vignati and
                  Lorenzo Nava and
                  Daniele Badagliacca and
                  Danilo Bruschi and
                  Long Lu and
                  Andrea Lanzi},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {JChainz: Automatic Detection of Deserialization Vulnerabilities for
                  the Java Language},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_8},
  doi          = {10.1007/978-3-031-29504-1\_8},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BuccioliCVNBBLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HicksMC22,
  author       = {Chris Hicks and
                  Vasilios Mavroudis and
                  Jon Crowcroft},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {SIMple {ID:} {QR} Codes for Authentication Using Basic Mobile Phones
                  in Developing Countries},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_1},
  doi          = {10.1007/978-3-031-29504-1\_1},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/HicksMC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HoussiauSCAM22,
  author       = {Florimond Houssiau and
                  Vincent Schellekens and
                  Antoine Chatalic and
                  Shreyas Kumar Annamraju and
                  Yves{-}Alexandre de Montjoye},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {M\({}^{\mbox{2}}\)M: {A} General Method to Perform Various Data Analysis
                  Tasks from a Differentially Private Sketch},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {117--135},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_7},
  doi          = {10.1007/978-3-031-29504-1\_7},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/HoussiauSCAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/IadarolaMMS22,
  author       = {Giacomo Iadarola and
                  Francesco Mercaldo and
                  Fabio Martinelli and
                  Antonella Santone},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Assessing Deep Learning Predictions in Image-Based Malware Detection
                  with Activation Maps},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_6},
  doi          = {10.1007/978-3-031-29504-1\_6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/IadarolaMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KirssLSV22,
  author       = {Johanna Maria Kirss and
                  Peeter Laud and
                  Nikita Snetkov and
                  Jelizaveta Vakarjuk},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Server-Supported Decryption for Mobile Devices},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {71--81},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_4},
  doi          = {10.1007/978-3-031-29504-1\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KirssLSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OserELK22,
  author       = {Pascal Oser and
                  Felix Engelmann and
                  Stefan L{\"{u}}ders and
                  Frank Kargl},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Evaluating the Future Device Security Risk Indicator for Hundreds
                  of IoT Devices},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {52--70},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_3},
  doi          = {10.1007/978-3-031-29504-1\_3},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OserELK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WangLZSW22,
  author       = {Pan Wang and
                  Zeyi Li and
                  Xiaokang Zhou and
                  Chunhua Su and
                  Weizheng Wang},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {FlowADGAN: Adversarial Learning for Deep Anomaly Network Intrusion
                  Detection},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {156--174},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_9},
  doi          = {10.1007/978-3-031-29504-1\_9},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WangLZSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/YuM22,
  author       = {Fangyi Yu and
                  Miguel Vargas Martin},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {HoneyGAN: Creating Indistinguishable Honeywords with Improved Generative
                  Adversarial Networks},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {189--198},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_11},
  doi          = {10.1007/978-3-031-29504-1\_11},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/YuM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZhaoWYLW22,
  author       = {Yanmin Zhao and
                  Yang Wang and
                  Siu Ming Yiu and
                  Yu Liu and
                  Meiqin Wang},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {A Hierarchical Watermarking Scheme for PRFs from Standard Lattice
                  Assumptions},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {24--51},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_2},
  doi          = {10.1007/978-3-031-29504-1\_2},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ZhaoWYLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZhouV22,
  author       = {Xin Zhou and
                  Rakesh M. Verma},
  editor       = {Gabriele Lenzini and
                  Weizhi Meng},
  title        = {Software Vulnerability Detection via Multimodal Deep Learning},
  booktitle    = {Security and Trust Management - 18th International Workshop, {STM}
                  2022, Copenhagen, Denmark, September 29, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13867},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29504-1\_5},
  doi          = {10.1007/978-3-031-29504-1\_5},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ZhouV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AbelaCMSFGHV21,
  author       = {Robert Abela and
                  Christian Colombo and
                  Peter Malo and
                  Peter S{\'{y}}s and
                  Tom{\'{a}}s Fabsic and
                  Ondrej Gallo and
                  Viliam Hromada and
                  Mark Vella},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Secure Implementation of a Quantum-Future {GAKE} Protocol},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_6},
  doi          = {10.1007/978-3-030-91859-0\_6},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/AbelaCMSFGHV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ChenLZLC21,
  author       = {Yifei Chen and
                  Meng Li and
                  Shuli Zheng and
                  Chhagan Lal and
                  Mauro Conti},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Where to Meet a Driver Privately: Recommending Pick-Up Locations for
                  Ride-Hailing Services},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {43--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_3},
  doi          = {10.1007/978-3-030-91859-0\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ChenLZLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FernetM21,
  author       = {Laouen Fernet and
                  Sebastian M{\"{o}}dersheim},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Deciding a Fragment of ({\(\alpha\)} , {\(\beta\)} )-Privacy},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {122--142},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_7},
  doi          = {10.1007/978-3-030-91859-0\_7},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FernetM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FotiadisMGCRRR21,
  author       = {Georgios Fotiadis and
                  Jos{\'{e}} Moreira and
                  Thanassis Giannetsos and
                  Liqun Chen and
                  Peter B. R{\o}nne and
                  Mark Ryan and
                  Peter Y. A. Ryan},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation
                  Protocols},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {163--184},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_9},
  doi          = {10.1007/978-3-030-91859-0\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FotiadisMGCRRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FukumitsuH21,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {An Aggregate Signature with Pre-communication in the Plain Public
                  Key Model},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_1},
  doi          = {10.1007/978-3-030-91859-0\_1},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FukumitsuH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KavousiMS21,
  author       = {Alireza Kavousi and
                  Javad Mohajeri and
                  Mahmoud Salmasizadeh},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Efficient Scalable Multi-party Private Set Intersection Using Oblivious
                  {PRF}},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {81--99},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_5},
  doi          = {10.1007/978-3-030-91859-0\_5},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KavousiMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KhouryRA21,
  author       = {Joud Khoury and
                  Zachary B. Ratliff and
                  Michael Atighetchi},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Towards Decentralized and Provably Secure Cross-Domain Solutions},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_10},
  doi          = {10.1007/978-3-030-91859-0\_10},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KhouryRA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Laud21,
  author       = {Peeter Laud},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Efficient Permutation Protocol for {MPC} in the Head},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {62--80},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_4},
  doi          = {10.1007/978-3-030-91859-0\_4},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Laud21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SpielvogelPP21,
  author       = {Korbinian Spielvogel and
                  Henrich C. P{\"{o}}hls and
                  Joachim Posegga},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {{TLS} Beyond the Broker: Enforcing Fine-Grained Security and Trust
                  in Publish/Subscribe Environments for IoT},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {145--162},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_8},
  doi          = {10.1007/978-3-030-91859-0\_8},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/SpielvogelPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Wang21,
  author       = {Yongge Wang},
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {The Adversary Capabilities in Practical Byzantine Fault Tolerance},
  booktitle    = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  pages        = {20--39},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0\_2},
  doi          = {10.1007/978-3-030-91859-0\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2021,
  editor       = {Rodrigo Roman and
                  Jianying Zhou},
  title        = {Security and Trust Management - 17th International Workshop, {STM}
                  2021, Darmstadt, Germany, October 8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13075},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91859-0},
  doi          = {10.1007/978-3-030-91859-0},
  isbn         = {978-3-030-91858-3},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AbadiH20,
  author       = {Eden Abadi and
                  Itay Hazan},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Improved Feature Engineering for Free-Text Keystroke Dynamics},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_6},
  doi          = {10.1007/978-3-030-59817-4\_6},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AbadiH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AroraM20,
  author       = {Vishal Arora and
                  Manoj Misra},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {A Novel Machine Learning Methodology for Detecting Phishing Attacks
                  in Real Time},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_3},
  doi          = {10.1007/978-3-030-59817-4\_3},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AroraM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Baghery20,
  author       = {Karim Baghery},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Subversion-Resistant Commitment Schemes: Definitions and Constructions},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {106--122},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_7},
  doi          = {10.1007/978-3-030-59817-4\_7},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Baghery20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LeguesseVCH20,
  author       = {Yonas Leguesse and
                  Mark Vella and
                  Christian Colombo and
                  Julio C. Hernandez{-}Castro},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Reducing the Forensic Footprint with Android Accessibility Attacks},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {22--38},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_2},
  doi          = {10.1007/978-3-030-59817-4\_2},
  timestamp    = {Sun, 23 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/LeguesseVCH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SchillingerS20,
  author       = {Fabian Schillinger and
                  Christian Schindelhauer},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Revocable Access to Encrypted Message Boards},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_4},
  doi          = {10.1007/978-3-030-59817-4\_4},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SchillingerS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SinghMCR20,
  author       = {Rajiv Ranjan Singh and
                  Jos{\'{e}} Moreira and
                  Tom Chothia and
                  Mark Dermot Ryan},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security
                  Properties},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_1},
  doi          = {10.1007/978-3-030-59817-4\_1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/SinghMCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SundararajKG20,
  author       = {Aynesh Sundararaj and
                  Silvia Knittl and
                  Jens Grossklags},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Challenges in {IT} Security Processes and Solution Approaches with
                  Process Mining},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {123--138},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_8},
  doi          = {10.1007/978-3-030-59817-4\_8},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SundararajKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WagnerBB20,
  author       = {Paul Georg Wagner and
                  Pascal Birnstill and
                  J{\"{u}}rgen Beyerer},
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Establishing Secure Communication Channels Using Remote Attestation
                  with {TPM} 2.0},
  booktitle    = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4\_5},
  doi          = {10.1007/978-3-030-59817-4\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WagnerBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2020,
  editor       = {Konstantinos Markantonakis and
                  Marinella Petrocchi},
  title        = {Security and Trust Management - 16th International Workshop, {STM}
                  2020, Guildford, UK, September 17-18, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12386},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59817-4},
  doi          = {10.1007/978-3-030-59817-4},
  isbn         = {978-3-030-59816-7},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BalliDV19,
  author       = {Fatih Balli and
                  F. Bet{\"{u}}l Durak and
                  Serge Vaudenay},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {BioID: {A} Privacy-Friendly Identity Document},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_4},
  doi          = {10.1007/978-3-030-31511-5\_4},
  timestamp    = {Mon, 23 Sep 2019 12:41:12 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BalliDV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BernsmedJF19,
  author       = {Karin Bernsmed and
                  Martin Gilje Jaatun and
                  Christian Fr{\o}ystad},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Is a Smarter Grid Also Riskier?},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_3},
  doi          = {10.1007/978-3-030-31511-5\_3},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BernsmedJF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BlomerL19,
  author       = {Johannes Bl{\"{o}}mer and
                  Nils L{\"{o}}ken},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Personal Cross-Platform Reputation},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_9},
  doi          = {10.1007/978-3-030-31511-5\_9},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BlomerL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CimatoCDE19,
  author       = {Stelvio Cimato and
                  Valentina Ciriani and
                  Ernesto Damiani and
                  Maryam Ehsanpour},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {158--167},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_10},
  doi          = {10.1007/978-3-030-31511-5\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CimatoCDE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GuttmanR19,
  author       = {Joshua D. Guttman and
                  John D. Ramsdell},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Understanding Attestation: Analyzing Protocols that Use Quotes},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_6},
  doi          = {10.1007/978-3-030-31511-5\_6},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GuttmanR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MorelliRSST19,
  author       = {Umberto Morelli and
                  Silvio Ranise and
                  Damiano Sartori and
                  Giada Sciarretta and
                  Alessandro Tomasi},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Audit-Based Access Control with a Distributed Ledger: Applications
                  to Healthcare Organizations},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_2},
  doi          = {10.1007/978-3-030-31511-5\_2},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MorelliRSST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaeiniN19,
  author       = {Mohammad G. Raeini and
                  Mehrdad Nojoumian},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Secure Trust Evaluation Using Multipath and Referral Chain Methods},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {124--139},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_8},
  doi          = {10.1007/978-3-030-31511-5\_8},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaeiniN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SheikhalishahiN19,
  author       = {Mina Sheikhalishahi and
                  Majid Nateghizad and
                  Fabio Martinelli and
                  Zekeriya Erkin and
                  Marco Loog},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {On the Statistical Detection of Adversarial Instances over Encrypted
                  Data},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_5},
  doi          = {10.1007/978-3-030-31511-5\_5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SheikhalishahiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WagnerBB19,
  author       = {Paul Georg Wagner and
                  Pascal Birnstill and
                  J{\"{u}}rgen Beyerer},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Challenges of Using Trusted Computing for Collaborative Data Processing},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_7},
  doi          = {10.1007/978-3-030-31511-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WagnerBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZieglerSL19,
  author       = {Jule Anna Ziegler and
                  Michael Schmidt and
                  Mikael Linden},
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Improving Identity and Authentication Assurance in Research {\&}
                  Education Federations},
  booktitle    = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5\_1},
  doi          = {10.1007/978-3-030-31511-5\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ZieglerSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2019,
  editor       = {Sjouke Mauw and
                  Mauro Conti},
  title        = {Security and Trust Management - 15th International Workshop, {STM}
                  2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11738},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31511-5},
  doi          = {10.1007/978-3-030-31511-5},
  isbn         = {978-3-030-31510-8},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Donmez18,
  author       = {Tahsin C. M. D{\"{o}}nmez},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Verifiable Outsourcing of Computations Using Garbled Onions},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_8},
  doi          = {10.1007/978-3-030-01141-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Donmez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Franke18,
  author       = {Ulrik Franke},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Cyber Insurance Against Electronic Payment Service Outages - {A} Document
                  Study of Terms and Conditions from Electronic Payment Service Providers
                  and Insurance Companies},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_5},
  doi          = {10.1007/978-3-030-01141-3\_5},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Franke18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JhawarLMR18,
  author       = {Ravi Jhawar and
                  Karim Lounis and
                  Sjouke Mauw and
                  Yunior Ram{\'{\i}}rez{-}Cruz},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Semi-automatically Augmenting Attack Trees Using an Annotated Attack
                  Tree Library},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_6},
  doi          = {10.1007/978-3-030-01141-3\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JhawarLMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KapustaM18,
  author       = {Katarzyna Kapusta and
                  G{\'{e}}rard Memmi},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {A Fast and Scalable Fragmentation Algorithm for Data Protection Using
                  Multi-storage over Independent Locations},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {54--69},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_4},
  doi          = {10.1007/978-3-030-01141-3\_4},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KapustaM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LeeY18,
  author       = {Suhho Lee and
                  Seehwan Yoo},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Tux: Trust Update on Linux Booting},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {105--121},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_7},
  doi          = {10.1007/978-3-030-01141-3\_7},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LeeY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PereraK18,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Takeshi Koshiba},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Achieving Strong Security and Verifier-Local Revocation for Dynamic
                  Group Signatures from Lattice Assumptions},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_1},
  doi          = {10.1007/978-3-030-01141-3\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/PereraK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaponiP18,
  author       = {Simone Raponi and
                  Roberto Di Pietro},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {A Spark Is Enough in a Straw World: {A} Study of Websites Password
                  Management in the Wild},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_3},
  doi          = {10.1007/978-3-030-01141-3\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaponiP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/YangEMM18,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Modular Verification of Sequential Composition for Private Channels
                  in Maude-NPA},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_2},
  doi          = {10.1007/978-3-030-01141-3\_2},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/YangEMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2018,
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3},
  doi          = {10.1007/978-3-030-01141-3},
  isbn         = {978-3-030-01140-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ArnaboldiM17,
  author       = {Luca Arnaboldi and
                  Charles Morisset},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {224--233},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_16},
  doi          = {10.1007/978-3-319-68063-7\_16},
  timestamp    = {Fri, 12 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ArnaboldiM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CanaveseRBV17,
  author       = {Daniele Canavese and
                  Leonardo Regano and
                  Cataldo Basile and
                  Alessio Viticchi{\'{e}}},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Estimating Software Obfuscation Potency with Artificial Neural Networks},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {193--202},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_13},
  doi          = {10.1007/978-3-319-68063-7\_13},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CanaveseRBV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DashC17,
  author       = {William Dash and
                  Matthew J. Craven},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Exploring Botnet Evolution via Multidimensional Models and Visualisation},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {72--88},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_5},
  doi          = {10.1007/978-3-319-68063-7\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/DashC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ErdodiJ17,
  author       = {L{\'{a}}szl{\'{o}} Erd{\"{o}}di and
                  Audun J{\o}sang},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Exploit Prevention, Quo Vadis?},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {180--190},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_12},
  doi          = {10.1007/978-3-319-68063-7\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ErdodiJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GadyatskayaJMTW17,
  author       = {Olga Gadyatskaya and
                  Ravi Jhawar and
                  Sjouke Mauw and
                  Rolando Trujillo{-}Rasua and
                  Tim A. C. Willemse},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Refinement-Aware Generation of Attack Trees},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {164--179},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_11},
  doi          = {10.1007/978-3-319-68063-7\_11},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/GadyatskayaJMTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GiorgiMMMS17,
  author       = {Giacomo Giorgi and
                  Antonio La Marra and
                  Fabio Martinelli and
                  Paolo Mori and
                  Andrea Saracino},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Smart Parental Advisory: {A} Usage Control and Deep Learning-Based
                  Framework for Dynamic Parental Control on Smart {TV}},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_8},
  doi          = {10.1007/978-3-319-68063-7\_8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GiorgiMMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GrubeTDM17,
  author       = {Tim Grube and
                  Markus Thummerer and
                  J{\"{o}}rg Daubert and
                  Max M{\"{u}}hlh{\"{a}}user},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Cover Traffic: {A} Trade of Anonymity and Efficiency},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {213--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_15},
  doi          = {10.1007/978-3-319-68063-7\_15},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GrubeTDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HomannGW17,
  author       = {Daniel Homann and
                  Christian G{\"{o}}ge and
                  Lena Wiese},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Dynamic Similarity Search over Encrypted Data with Low Leakage},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_2},
  doi          = {10.1007/978-3-319-68063-7\_2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/HomannGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Josang17,
  author       = {Audun J{\o}sang},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {A Consistent Definition of Authorization},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {134--144},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_9},
  doi          = {10.1007/978-3-319-68063-7\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Josang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KalalaFK17,
  author       = {Kalonji Kalala and
                  Tao Feng and
                  Iluju Kiringa},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {EigenTrust for Hierarchically Structured Chord},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_14},
  doi          = {10.1007/978-3-319-68063-7\_14},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KalalaFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KikuchiNY17,
  author       = {Hiroaki Kikuchi and
                  Koichi Niihara and
                  Michihiro Yamada},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {How Much is Risk Increased by Sharing Credential in Group?},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {103--117},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_7},
  doi          = {10.1007/978-3-319-68063-7\_7},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KikuchiNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MelandTMS17,
  author       = {Per H{\aa}kon Meland and
                  Inger Anne T{\o}ndel and
                  Marie Elisabeth Gaup Moe and
                  Fredrik Seehusen},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Facing Uncertainty in Cyber Insurance Policies},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_6},
  doi          = {10.1007/978-3-319-68063-7\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MelandTMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NoormanMP17,
  author       = {Job Noorman and
                  Jan Tobias M{\"{u}}hlberg and
                  Frank Piessens},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Authentic Execution of Distributed Event-Driven Applications with
                  a Small {TCB}},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_4},
  doi          = {10.1007/978-3-319-68063-7\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/NoormanMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OgawaTH17,
  author       = {Kazuto Ogawa and
                  Sakurako Tamura and
                  Goichiro Hanaoka},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Key Management for Versatile Pay-TV Services},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_1},
  doi          = {10.1007/978-3-319-68063-7\_1},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OgawaTH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SeyeS17,
  author       = {Papa B. Seye and
                  Augustin P. Sarr},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Enhanced Modelling of Authenticated Key Exchange Security},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {36--52},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_3},
  doi          = {10.1007/978-3-319-68063-7\_3},
  timestamp    = {Thu, 14 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SeyeS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WhitefieldCKPST17,
  author       = {Jorden Whitefield and
                  Liqun Chen and
                  Frank Kargl and
                  Andrew Paverd and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Formal Analysis of {V2X} Revocation Protocols},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_10},
  doi          = {10.1007/978-3-319-68063-7\_10},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WhitefieldCKPST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2017,
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7},
  doi          = {10.1007/978-3-319-68063-7},
  isbn         = {978-3-319-68062-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/0001BP16,
  author       = {Mathias Weber and
                  Annette Bieniusa and
                  Arnd Poetzsch{-}Heffter},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Access Control for Weakly Consistent Replicated Information Systems},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_6},
  doi          = {10.1007/978-3-319-46598-2\_6},
  timestamp    = {Sat, 19 Oct 2019 20:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/0001BP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BarbonCFS16,
  author       = {Gianluca Barbon and
                  Agostino Cortesi and
                  Pietro Ferrara and
                  Enrico Steffinlongo},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {{DAPA:} Degradation-Aware Privacy Analysis of Android Apps},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {32--46},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_3},
  doi          = {10.1007/978-3-319-46598-2\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BarbonCFS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BroekH016,
  author       = {Fabian van den Broek and
                  Brinda Hampiholi and
                  Bart Jacobs},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Securely Derived Identity Credentials on Smart Phones via Self-enrolment},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_8},
  doi          = {10.1007/978-3-319-46598-2\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BroekH016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CucurullP16,
  author       = {Jordi Cucurull and
                  Jordi Puiggali},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Distributed Immutabilization of Secure Logs},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {122--137},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_9},
  doi          = {10.1007/978-3-319-46598-2\_9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CucurullP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FollnerBPCIPB16,
  author       = {Andreas Follner and
                  Alexandre Bartel and
                  Hui Peng and
                  Yu{-}Chen Chang and
                  Kyriakos K. Ispoglou and
                  Mathias Payer and
                  Eric Bodden},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {{PSHAPE:} Automatically Combining Gadgets for Arbitrary Method Execution},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {212--228},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_15},
  doi          = {10.1007/978-3-319-46598-2\_15},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/FollnerBPCIPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JamrogaT16,
  author       = {Wojciech Jamroga and
                  Masoud Tabatabaei},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Information Security as Strategic (In)effectivity},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_11},
  doi          = {10.1007/978-3-319-46598-2\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JamrogaT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JhawarLM16,
  author       = {Ravi Jhawar and
                  Karim Lounis and
                  Sjouke Mauw},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {A Stochastic Framework for Quantitative Analysis of Attack-Defense
                  Trees},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_10},
  doi          = {10.1007/978-3-319-46598-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JhawarLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KhanM16,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Retrofitting Mutual Authentication to {GSM} Using {RAND} Hijacking},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {17--31},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_2},
  doi          = {10.1007/978-3-319-46598-2\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KhanM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LenziniMO16,
  author       = {Gabriele Lenzini and
                  Sjouke Mauw and
                  Samir Ouchani},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical
                  Systems},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {170--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_12},
  doi          = {10.1007/978-3-319-46598-2\_12},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LenziniMO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MartinelliMMS16,
  author       = {Fabio Martinelli and
                  Ilaria Matteucci and
                  Paolo Mori and
                  Andrea Saracino},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Enforcement of {U-XACML} History-Based Usage Control Policy},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {64--81},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_5},
  doi          = {10.1007/978-3-319-46598-2\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MartinelliMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MeoR016,
  author       = {Federico De Meo and
                  Marco Rocchetto and
                  Luca Vigan{\`{o}}},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Formal Analysis of Vulnerabilities of Web Applications Based on {SQL}
                  Injection},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {179--195},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_13},
  doi          = {10.1007/978-3-319-46598-2\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MeoR016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RathNZ16,
  author       = {Christof Rath and
                  Thomas Niedermair and
                  Thomas Zefferer},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Towards a Personal Security Device},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_1},
  doi          = {10.1007/978-3-319-46598-2\_1},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RathNZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RiosGL16,
  author       = {Ruben Rios and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Javier L{\'{o}}pez},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Privacy-Aware Trust Negotiation},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {98--105},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_7},
  doi          = {10.1007/978-3-319-46598-2\_7},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RiosGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RushananRR16,
  author       = {Michael Rushanan and
                  David Russell and
                  Aviel D. Rubin},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {MalloryWorker: Stealthy Computation and Covert Channels Using Web
                  Workers},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_14},
  doi          = {10.1007/978-3-319-46598-2\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RushananRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SayahCTH16,
  author       = {Tarek Sayah and
                  Emmanuel Coquery and
                  Romuald Thion and
                  Mohand{-}Sa{\"{\i}}d Hacid},
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Access Control Enforcement for Selective Disclosure of Linked Data},
  booktitle    = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  pages        = {47--63},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2\_4},
  doi          = {10.1007/978-3-319-46598-2\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SayahCTH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2016,
  editor       = {Gilles Barthe and
                  Evangelos P. Markatos and
                  Pierangela Samarati},
  title        = {Security and Trust Management - 12th International Workshop, {STM}
                  2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9871},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46598-2},
  doi          = {10.1007/978-3-319-46598-2},
  isbn         = {978-3-319-46597-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AbedCL15,
  author       = {Amr S. Abed and
                  Charles Clancy and
                  David S. Levy},
  editor       = {Sara Foresti},
  title        = {Intrusion Detection System for Applications Using Linux Containers},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_8},
  doi          = {10.1007/978-3-319-24858-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AbedCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BrozM15,
  author       = {Milan Broz and
                  Vashek Maty{\'{a}}s},
  editor       = {Sara Foresti},
  title        = {Selecting a New Key Derivation Function for Disk Encryption},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_12},
  doi          = {10.1007/978-3-319-24858-5\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BrozM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonW15,
  author       = {Jason Crampton and
                  Conrad Williams},
  editor       = {Sara Foresti},
  title        = {Obligations in PTaCL},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {220--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_14},
  doi          = {10.1007/978-3-319-24858-5\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CramptonW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FerreiraHKL15,
  author       = {Ana Ferreira and
                  Jean{-}Louis Huynen and
                  Vincent Koenig and
                  Gabriele Lenzini},
  editor       = {Sara Foresti},
  title        = {In Cyber-Space No One Can Hear You S{\(\cdot\)}CREAM - {A} Root Cause
                  Analysis for Socio-Technical Security},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {255--264},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_16},
  doi          = {10.1007/978-3-319-24858-5\_16},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/FerreiraHKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GaleaV15,
  author       = {John Galea and
                  Mark Vella},
  editor       = {Sara Foresti},
  title        = {{SUDUTA:} Script {UAF} Detection Using Taint Analysis},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_9},
  doi          = {10.1007/978-3-319-24858-5\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GaleaV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KanstrenE15,
  author       = {Teemu Kanstr{\'{e}}n and
                  Antti Evesti},
  editor       = {Sara Foresti},
  title        = {Security Metrics, Secure Elements, and Operational Measurement Trust
                  in Cloud Environments},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {37--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_3},
  doi          = {10.1007/978-3-319-24858-5\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KanstrenE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KarafiliNN15,
  author       = {Erisa Karafili and
                  Hanne Riis Nielson and
                  Flemming Nielson},
  editor       = {Sara Foresti},
  title        = {How to Trust the Re-use of Data},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {72--88},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_5},
  doi          = {10.1007/978-3-319-24858-5\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KarafiliNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LavyginaRD15,
  author       = {Anna Lavygina and
                  Alessandra Russo and
                  Naranker Dulay},
  editor       = {Sara Foresti},
  title        = {Integrating Privacy and Safety Criteria into Planning Tasks},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_2},
  doi          = {10.1007/978-3-319-24858-5\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LavyginaRD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MannL15,
  author       = {Christopher Mann and
                  Daniel Loebenberger},
  editor       = {Sara Foresti},
  title        = {Two-Factor Authentication for the Bitcoin Protocol},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {155--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_10},
  doi          = {10.1007/978-3-319-24858-5\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MannL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MasellisGR15,
  author       = {Riccardo De Masellis and
                  Chiara Ghidini and
                  Silvio Ranise},
  editor       = {Sara Foresti},
  title        = {A Declarative Framework for Specifying and Enforcing Purpose-Aware
                  Policies},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_4},
  doi          = {10.1007/978-3-319-24858-5\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MasellisGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OgawaHI15,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Sara Foresti},
  title        = {Content and Key Management to Trace Traitors in Broadcasting Services},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {236--252},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_15},
  doi          = {10.1007/978-3-319-24858-5\_15},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OgawaHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PandeyH15,
  author       = {Pankaj Pandey and
                  Steven De Haes},
  editor       = {Sara Foresti},
  title        = {Design, Demonstration, and Evaluation of an Information Security Contract
                  and Trading Mechanism to Hedge Information Security Risks},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {283--292},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_19},
  doi          = {10.1007/978-3-319-24858-5\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/PandeyH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PatsakisKB15,
  author       = {Constantinos Patsakis and
                  Panayiotis Kotzanikolaou and
                  M{\'{e}}lanie Bouroche},
  editor       = {Sara Foresti},
  title        = {Private Proximity Testing on Steroids: An NTRU-based Protocol},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {172--184},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_11},
  doi          = {10.1007/978-3-319-24858-5\_11},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/PatsakisKB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PuglieseRP15,
  author       = {Andrea Pugliese and
                  Antonino Rullo and
                  Antonio Piccolo},
  editor       = {Sara Foresti},
  title        = {The AC-Index: Fast Online Detection of Correlated Alerts},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {107--122},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_7},
  doi          = {10.1007/978-3-319-24858-5\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/PuglieseRP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RyutovOBW15,
  author       = {Tatyana Ryutov and
                  Michael D. Orosz and
                  James Blythe and
                  Detlof von Winterfeldt},
  editor       = {Sara Foresti},
  title        = {A Game Theoretic Framework for Modeling Adversarial Cyber Security
                  Game Among Attackers, Defenders, and Users},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {274--282},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_18},
  doi          = {10.1007/978-3-319-24858-5\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RyutovOBW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SheikhalishahiS15,
  author       = {Mina Sheikhalishahi and
                  Andrea Saracino and
                  Mohamed Mejri and
                  Nadia Tawbi and
                  Fabio Martinelli},
  editor       = {Sara Foresti},
  title        = {Digital Waste Sorting: {A} Goal-Based, Self-Learning Approach to Label
                  Spam Email Campaigns},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_1},
  doi          = {10.1007/978-3-319-24858-5\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SheikhalishahiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/VolkamerRKE15,
  author       = {Melanie Volkamer and
                  Karen Renaud and
                  Oksana Kulyk and
                  Sinem Emer{\"{o}}z},
  editor       = {Sara Foresti},
  title        = {A Socio-Technical Investigation into Smartphone Security},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {265--273},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_17},
  doi          = {10.1007/978-3-319-24858-5\_17},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/VolkamerRKE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/WayeBKCR15,
  author       = {Lucas Waye and
                  Pablo Buiras and
                  Dan King and
                  Stephen Chong and
                  Alejandro Russo},
  editor       = {Sara Foresti},
  title        = {It's My Privilege: Controlling Downgrading in DC-Labels},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {203--219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_13},
  doi          = {10.1007/978-3-319-24858-5\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/WayeBKCR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ZimmermannN15,
  author       = {Christian Zimmermann and
                  Claus{-}Georg Nolte},
  editor       = {Sara Foresti},
  title        = {Towards Balancing Privacy and Efficiency: {A} Principal-Agent Model
                  of Data-Centric Business},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {89--104},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_6},
  doi          = {10.1007/978-3-319-24858-5\_6},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/ZimmermannN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2015,
  editor       = {Sara Foresti},
  title        = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5},
  doi          = {10.1007/978-3-319-24858-5},
  isbn         = {978-3-319-24857-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AlagarW14,
  author       = {Vangalur S. Alagar and
                  Kaiyu Wan},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Integrating Trust and Economic Theories with Knowledge Science for
                  Dependable Service Automation},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_1},
  doi          = {10.1007/978-3-319-11851-2\_1},
  timestamp    = {Thu, 23 Sep 2021 11:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AlagarW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AliF14,
  author       = {Asad Ali and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Hybrid Enforcement of Category-Based Access Control},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {178--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_12},
  doi          = {10.1007/978-3-319-11851-2\_12},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/AliF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AntignacM14,
  author       = {Thibaud Antignac and
                  Daniel Le M{\'{e}}tayer},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Privacy Architectures: Reasoning about Data Minimisation and Integrity},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_2},
  doi          = {10.1007/978-3-319-11851-2\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AntignacM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BackesGK14,
  author       = {Michael Backes and
                  Niklas Grimm and
                  Aniket Kate},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Lime: Data Lineage in the Malicious Environment},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {183--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_13},
  doi          = {10.1007/978-3-319-11851-2\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BackesGK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BamertDWW14,
  author       = {Tobias Bamert and
                  Christian Decker and
                  Roger Wattenhofer and
                  Samuel Welten},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {BlueWallet: The Secure Bitcoin Wallet},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_5},
  doi          = {10.1007/978-3-319-11851-2\_5},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BamertDWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CanovaVBB14,
  author       = {Gamze Canova and
                  Melanie Volkamer and
                  Clemens Bergmann and
                  Roland Borza},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {NoPhish: An Anti-Phishing Education App},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {188--192},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_14},
  doi          = {10.1007/978-3-319-11851-2\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CanovaVBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonM14,
  author       = {Jason Crampton and
                  Charles Morisset},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Monotonicity and Completeness in Attribute-Based Access Control},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_3},
  doi          = {10.1007/978-3-319-11851-2\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CramptonM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonS14,
  author       = {Jason Crampton and
                  James Sellwood},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Caching and Auditing in the {RPPM} Model},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_4},
  doi          = {10.1007/978-3-319-11851-2\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CramptonS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Dimovski14,
  author       = {Aleksandar S. Dimovski},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Ensuring Secure Non-interference of Programs by Game Semantics},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_6},
  doi          = {10.1007/978-3-319-11851-2\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Dimovski14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JurneckaSM14,
  author       = {Filip Jurnecka and
                  Martin Stehl{\'{\i}}k and
                  Vashek Matyas},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Evaluation of Key Management Schemes in Wireless Sensor Networks},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {198--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_16},
  doi          = {10.1007/978-3-319-11851-2\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JurneckaSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LazouskiMMS14,
  author       = {Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Paolo Mori and
                  Andrea Saracino},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Stateful Usage Control for Android Mobile Devices},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_7},
  doi          = {10.1007/978-3-319-11851-2\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LazouskiMMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Modesti14,
  author       = {Paolo Modesti},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Efficient Java Code Generation of Security Protocols Specified in
                  AnB/AnBx},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {204--208},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_17},
  doi          = {10.1007/978-3-319-11851-2\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Modesti14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MorissetYGM14,
  author       = {Charles Morisset and
                  Iryna Yevseyeva and
                  Thomas Gro{\ss} and
                  Aad P. A. van Moorsel},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {A Formal Model for Soft Enforcement: Influencing the Decision-Maker},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_8},
  doi          = {10.1007/978-3-319-11851-2\_8},
  timestamp    = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/MorissetYGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PandeyS14,
  author       = {Pankaj Pandey and
                  Einar Arthur Snekkenes},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Using Prediction Markets to Hedge Information Security Risks},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_9},
  doi          = {10.1007/978-3-319-11851-2\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/PandeyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaniseT14,
  author       = {Silvio Ranise and
                  Riccardo Traverso},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {{ALPS:} An Action Language for Policy Specification and Automated
                  Safety Analysis},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {146--161},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_10},
  doi          = {10.1007/978-3-319-11851-2\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaniseT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SantiagoEMM14,
  author       = {Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {A Formal Definition of Protocol Indistinguishability and Its Verification
                  Using Maude-NPA},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_11},
  doi          = {10.1007/978-3-319-11851-2\_11},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SantiagoEMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/TormoMP14,
  author       = {Gin{\'{e}}s D{\'{o}}lera Tormo and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {{ROMEO:} ReputatiOn Model Enhancing OpenID Simulator},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {193--197},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_15},
  doi          = {10.1007/978-3-319-11851-2\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/TormoMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2014,
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2},
  doi          = {10.1007/978-3-319-11851-2},
  isbn         = {978-3-319-11850-5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BenedictisKAC13,
  author       = {Alessandra De Benedictis and
                  Behzad Koosha and
                  Massimiliano Albanese and
                  Valentina Casola},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {A Probabilistic Framework for Distributed Localization of Attackers
                  in MANETs},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_4},
  doi          = {10.1007/978-3-642-41098-7\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BenedictisKAC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BottaCP13,
  author       = {Marco Botta and
                  Davide Cavagnino and
                  Victor Pomponiu},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Weighted-Sum Fragile Watermarking in the Karhunen-Lo{\`{e}}ve Domain},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_15},
  doi          = {10.1007/978-3-642-41098-7\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BottaCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ContiDG13,
  author       = {Mauro Conti and
                  Nicola Dragoni and
                  Sebastiano Gottardo},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {{MITHYS:} Mind The Hand You Shake - Protecting Mobile Devices from
                  {SSL} Usage Vulnerabilities},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_5},
  doi          = {10.1007/978-3-642-41098-7\_5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/ContiDG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DelakouridisA13,
  author       = {Costas Delakouridis and
                  Christos Anagnostopoulos},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {On Enhancement of 'Share The Secret' Scheme for Location Privacy},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_1},
  doi          = {10.1007/978-3-642-41098-7\_1},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/DelakouridisA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FerreiraHKLR13,
  author       = {Ana Ferreira and
                  Jean{-}Louis Huynen and
                  Vincent Koenig and
                  Gabriele Lenzini and
                  Salvador Rivas},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Socio-Technical Study on the Effect of Trust and Context When Choosing
                  WiFi Names},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_9},
  doi          = {10.1007/978-3-642-41098-7\_9},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/FerreiraHKLR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Franco-ContrerasCCCR13,
  author       = {Javier Franco{-}Contreras and
                  Gouenou Coatrieux and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christian Roux},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Authenticity Control of Relational Databases by Means of Lossless
                  Watermarking Based on Circular Histogram Modulation},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_14},
  doi          = {10.1007/978-3-642-41098-7\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Franco-ContrerasCCCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KoslowskiZ13,
  author       = {Thomas G. Koslowski and
                  Christian Zimmermann},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Towards a Detective Approach to Process-Centered Resilience},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_12},
  doi          = {10.1007/978-3-642-41098-7\_12},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/KoslowskiZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/LaudP13,
  author       = {Peeter Laud and
                  Alisa Pankova},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {New Attacks against Transformation-Based Privacy-Preserving Linear
                  Programming},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_2},
  doi          = {10.1007/978-3-642-41098-7\_2},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/LaudP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MalliosBKMM13,
  author       = {Yannis Mallios and
                  Lujo Bauer and
                  Dilsun Kirli Kaynar and
                  Fabio Martinelli and
                  Charles Morisset},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Probabilistic Cost Enforcement of Security Policies},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_10},
  doi          = {10.1007/978-3-642-41098-7\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MalliosBKMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MylonasTG13,
  author       = {Alexios Mylonas and
                  Nikolaos Tsalis and
                  Dimitris Gritzalis},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Evaluating the Manageability of Web Browsers Controls},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {82--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_6},
  doi          = {10.1007/978-3-642-41098-7\_6},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/MylonasTG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RileyCM13,
  author       = {Ryan D. Riley and
                  Chris Clifton and
                  Qutaibah M. Malluhi},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Maintaining Database Anonymity in the Presence of Queries},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_3},
  doi          = {10.1007/978-3-642-41098-7\_3},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RileyCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RocchettoVVV13,
  author       = {Marco Rocchetto and
                  Luca Vigan{\`{o}} and
                  Marco Volpe and
                  Giacomo Dalle Vedove},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Using Interpolation for the Verification of Security Protocols},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_7},
  doi          = {10.1007/978-3-642-41098-7\_7},
  timestamp    = {Fri, 08 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RocchettoVVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Rodriguez-HenriquezC13,
  author       = {Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Debrup Chakraborty},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {{RDAS:} {A} Symmetric Key Scheme for Authenticated Query Processing
                  in Outsourced Databases},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_8},
  doi          = {10.1007/978-3-642-41098-7\_8},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Rodriguez-HenriquezC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/StockerB13,
  author       = {Thomas Stocker and
                  Frank B{\"{o}}hr},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {IF-Net: {A} Meta-Model for Security-Oriented Process Specification},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {191--206},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_13},
  doi          = {10.1007/978-3-642-41098-7\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/StockerB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SultanaBK13,
  author       = {Nik Sultana and
                  Moritz Y. Becker and
                  Markulf Kohlweiss},
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Selective Disclosure in Datalog-Based Trust Management},
  booktitle    = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7\_11},
  doi          = {10.1007/978-3-642-41098-7\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SultanaBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2012,
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38004-4},
  doi          = {10.1007/978-3-642-38004-4},
  isbn         = {978-3-642-38003-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2013,
  editor       = {Rafael Accorsi and
                  Silvio Ranise},
  title        = {Security and Trust Management - 9th International Workshop, {STM}
                  2013, Egham, UK, September 12-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41098-7},
  doi          = {10.1007/978-3-642-41098-7},
  isbn         = {978-3-642-41097-0},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BarlettaRV12,
  author       = {Michele Barletta and
                  Silvio Ranise and
                  Luca Vigan{\`{o}}},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Automated Analysis of Scenario-Based Specifications of Distributed
                  Access Control Policies with Non-mechanizable Activities},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_4},
  doi          = {10.1007/978-3-642-38004-4\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BarlettaRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BlundoC12,
  author       = {Carlo Blundo and
                  Stelvio Cimato},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Constrained Role Mining},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_19},
  doi          = {10.1007/978-3-642-38004-4\_19},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BlundoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CaravagnaCP12,
  author       = {Giulio Caravagna and
                  Gabriele Costa and
                  Giovanni Pardini},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Lazy Security Controllers},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_3},
  doi          = {10.1007/978-3-642-38004-4\_3},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CaravagnaCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DelftBS12,
  author       = {Bart van Delft and
                  Niklas Broberg and
                  David Sands},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {A Datalog Semantics for Paralocks},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {305--320},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_20},
  doi          = {10.1007/978-3-642-38004-4\_20},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/DelftBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DrabikMM12,
  author       = {Peter Dr{\'{a}}bik and
                  Fabio Martinelli and
                  Charles Morisset},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Cost-Aware Runtime Enforcement of Security Policies},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_1},
  doi          = {10.1007/978-3-642-38004-4\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/DrabikMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DumasH12,
  author       = {Jean{-}Guillaume Dumas and
                  Hicham Hossayni},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {129--144},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_9},
  doi          = {10.1007/978-3-642-38004-4\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/DumasH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FrauD12,
  author       = {Simone Frau and
                  Mohammad Torabi Dashti},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Analysis of Communicating Authorization Policies},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_7},
  doi          = {10.1007/978-3-642-38004-4\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/FrauD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GenoveseGR12,
  author       = {Valerio Genovese and
                  Deepak Garg and
                  Daniele Rispoli},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Labeled Goal-Directed Search in Access Control Logic},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_5},
  doi          = {10.1007/978-3-642-38004-4\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GenoveseGR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GevaH12,
  author       = {Moti Geva and
                  Amir Herzberg},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {{DOT-COM:} Decentralized Online Trading and COMmerce},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_12},
  doi          = {10.1007/978-3-642-38004-4\_12},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GevaH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GrompanopoulosGM12,
  author       = {Christos Grompanopoulos and
                  Antonios Gouglidis and
                  Ioannis Mavridis},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {A Use-Based Approach for Enhancing {UCON}},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {81--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_6},
  doi          = {10.1007/978-3-642-38004-4\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GrompanopoulosGM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GrootBLLV12,
  author       = {Joep A. de Groot and
                  Vinh T. Bui and
                  Jean{-}Paul M. G. Linnartz and
                  Johan Lukkien and
                  Richard Verhoeven},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Software Authentication to Enhance Trust in Body Sensor Networks},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_16},
  doi          = {10.1007/978-3-642-38004-4\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GrootBLLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KunnemannS12,
  author       = {Robert K{\"{u}}nnemann and
                  Graham Steel},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {257--272},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_17},
  doi          = {10.1007/978-3-642-38004-4\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KunnemannS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MalliosBKL12,
  author       = {Yannis Mallios and
                  Lujo Bauer and
                  Dilsun Kirli Kaynar and
                  Jay Ligatti},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_2},
  doi          = {10.1007/978-3-642-38004-4\_2},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MalliosBKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MauwP12,
  author       = {Sjouke Mauw and
                  Selwyn Piramuthu},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {A PUF-Based Authentication Protocol to Address Ticket-Switching of
                  RFID-Tagged Items},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_14},
  doi          = {10.1007/978-3-642-38004-4\_14},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MauwP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MeadowsP12,
  author       = {Catherine Meadows and
                  Dusko Pavlovic},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Formalizing Physical Security Procedures},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_13},
  doi          = {10.1007/978-3-642-38004-4\_13},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MeadowsP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MoyanoGL12,
  author       = {Francisco Moyano and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Javier L{\'{o}}pez},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Building Trust and Reputation In: {A} Development Framework for Trust
                  Models Implementation},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {113--128},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_8},
  doi          = {10.1007/978-3-642-38004-4\_8},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/MoyanoGL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NazzicariASJ12,
  author       = {Nelson Nazzicari and
                  Javier Almillategui and
                  Angelos Stavrou and
                  Sushil Jajodia},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation
                  Identification},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_11},
  doi          = {10.1007/978-3-642-38004-4\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OhrimenkoRT12,
  author       = {Olga Ohrimenko and
                  Hobart Reynolds and
                  Roberto Tamassia},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Authenticating Email Search Results},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {225--240},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_15},
  doi          = {10.1007/978-3-642-38004-4\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OhrimenkoRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RaniseTA12,
  author       = {Silvio Ranise and
                  Anh Tuan Truong and
                  Alessandro Armando},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Boosting Model Checking to Analyse Large {ARBAC} Policies},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {273--288},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_18},
  doi          = {10.1007/978-3-642-38004-4\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RaniseTA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/VeeningenWZ12,
  author       = {Meilof Veeningen and
                  Benne de Weger and
                  Nicola Zannone},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Formal Modelling of (De)Pseudonymisation: {A} Case Study in Health
                  Care Privacy},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {145--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_10},
  doi          = {10.1007/978-3-642-38004-4\_10},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/VeeningenWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2011,
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29963-6},
  doi          = {10.1007/978-3-642-29963-6},
  isbn         = {978-3-642-29962-9},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ArmandoR11,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Automated Analysis of Infinite State Workflows with Access Control
                  Policies},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {157--174},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_12},
  doi          = {10.1007/978-3-642-29963-6\_12},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ArmandoR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ChenC11,
  author       = {Liang Chen and
                  Jason Crampton},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Risk-Aware Role-Based Access Control},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {140--156},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_11},
  doi          = {10.1007/978-3-642-29963-6\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ChenC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GenoveseG11,
  author       = {Valerio Genovese and
                  Deepak Garg},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {New Modalities for Access Control Logics: Permission, Control and
                  Ratification},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {56--71},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_6},
  doi          = {10.1007/978-3-642-29963-6\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GenoveseG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GrevelerJL11,
  author       = {Ulrich Greveler and
                  Benjamin Justus and
                  Dennis L{\"{o}}hr},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Mutual Remote Attestation: Enabling System Cloning for {TPM} Based
                  Platforms},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {193--206},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_14},
  doi          = {10.1007/978-3-642-29963-6\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GrevelerJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/JamrogaMM11,
  author       = {Wojciech Jamroga and
                  Sjouke Mauw and
                  Matthijs Melissen},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Fairness in Non-Repudiation Protocols},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_10},
  doi          = {10.1007/978-3-642-29963-6\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/JamrogaMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Josang11,
  author       = {Audun J{\o}sang},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Trust Extortion on the Internet},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {6--21},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_2},
  doi          = {10.1007/978-3-642-29963-6\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Josang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MarshNSWBRSEEBDCS11,
  author       = {Stephen Marsh and
                  Sylvie No{\"{e}}l and
                  Tim Storer and
                  Yao Wang and
                  Pamela Briggs and
                  Lewis Robart and
                  John A. Stewart and
                  Babak Esfandiari and
                  Khalil El{-}Khatib and
                  Mehmet Vefa Bicakci and
                  Manh Cuong Dao and
                  Michael Cohen and
                  Daniel Da Silva},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Non-standards for Trust: Foreground Trust and Second Thoughts for
                  Mobile Security},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_4},
  doi          = {10.1007/978-3-642-29963-6\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MarshNSWBRSEEBDCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MorgensternGP11,
  author       = {Jamie Morgenstern and
                  Deepak Garg and
                  Frank Pfenning},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {A Proof-Carrying File System with Revocable and Use-Once Certificates},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_5},
  doi          = {10.1007/978-3-642-29963-6\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MorgensternGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MullerK11,
  author       = {Sascha M{\"{u}}ller and
                  Stefan Katzenbeisser},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Hiding the Policy in Cryptographic Access Control},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {90--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_8},
  doi          = {10.1007/978-3-642-29963-6\_8},
  timestamp    = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MullerK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NajeraRL11,
  author       = {Pablo Najera and
                  Rodrigo Roman and
                  Javier L{\'{o}}pez},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Secure Architecure for the Integration of {RFID} and Sensors in Personal
                  Networks},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_15},
  doi          = {10.1007/978-3-642-29963-6\_15},
  timestamp    = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/NajeraRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/PohlsH11,
  author       = {Henrich Christopher P{\"{o}}hls and
                  Focke H{\"{o}}hne},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {The Role of Data Integrity in {EU} Digital Signature Legislation -
                  Achieving Statutory Trust for Sanitizable Signature Schemes},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_13},
  doi          = {10.1007/978-3-642-29963-6\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/PohlsH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RahmanCG11,
  author       = {Syed Sadiqur Rahman and
                  Sadie Creese and
                  Michael Goldsmith},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Accepting Information with a Pinch of Salt: Handling Untrusted Information
                  Sources},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {223--238},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_16},
  doi          = {10.1007/978-3-642-29963-6\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RahmanCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/RechertG11,
  author       = {Klaus Rechert and
                  Benjamin Greschbach},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Location Privacy in Relation to Trusted Peers},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_9},
  doi          = {10.1007/978-3-642-29963-6\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/RechertG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Rudolph11,
  author       = {Carsten Rudolph},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Trust Areas: {A} Security Paradigm for the Future Internet},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {22--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_3},
  doi          = {10.1007/978-3-642-29963-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Rudolph11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Sarier11,
  author       = {Neyire Deniz Sarier},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Security Notions of Biometric Remote Authentication Revisited},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {72--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_7},
  doi          = {10.1007/978-3-642-29963-6\_7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Sarier11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SolhaugS11,
  author       = {Bj{\o}rnar Solhaug and
                  Ketil St{\o}len},
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Uncertainty, Subjectivity, Trust and Risk: How It All Fits together},
  booktitle    = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29963-6\_1},
  doi          = {10.1007/978-3-642-29963-6\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SolhaugS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2010,
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22444-7},
  doi          = {10.1007/978-3-642-22444-7},
  isbn         = {978-3-642-22443-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AccorsiW10,
  author       = {Rafael Accorsi and
                  Claus Wonnemann},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {InDico: Information Flow Analysis of Business Processes for Confidentiality
                  Requirements},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {194--209},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_13},
  doi          = {10.1007/978-3-642-22444-7\_13},
  timestamp    = {Tue, 07 May 2024 20:13:56 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AccorsiW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/AkgunC10,
  author       = {Mete Akg{\"{u}}n and
                  Mehmet Ufuk {\c{C}}aglayan},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Extending an {RFID} Security and Privacy Model by Considering Forward
                  Untraceability},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {239--254},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_16},
  doi          = {10.1007/978-3-642-22444-7\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/AkgunC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ArmandoR10,
  author       = {Alessandro Armando and
                  Silvio Ranise},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Automated Symbolic Analysis of ARBAC-Policies},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_2},
  doi          = {10.1007/978-3-642-22444-7\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/ArmandoR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BasedM10,
  author       = {Md. Abdul Based and
                  Stig Fr. Mj{\o}lsnes},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Universally Composable {NIZK} Protocol in an Internet Voting Scheme},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {147--162},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_10},
  doi          = {10.1007/978-3-642-22444-7\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BasedM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BertolissiF10,
  author       = {Clara Bertolissi and
                  Maribel Fern{\'{a}}ndez},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Rewrite Specifications of Access Control Policies in Distributed Environments},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_4},
  doi          = {10.1007/978-3-642-22444-7\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BertolissiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/BezziVLS10,
  author       = {Michele Bezzi and
                  Sabrina De Capitani di Vimercati and
                  Giovanni Livraga and
                  Pierangela Samarati},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Protecting Privacy of Sensitive Value Distributions in Data Release},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_17},
  doi          = {10.1007/978-3-642-22444-7\_17},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/BezziVLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonM10,
  author       = {Jason Crampton and
                  Charles Morisset},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {An Auto-delegation Mechanism for Access Control Systems},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_1},
  doi          = {10.1007/978-3-642-22444-7\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/CramptonM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/DionysiouGB10,
  author       = {Ioanna Dionysiou and
                  K. Harald Gjermundr{\o}d and
                  David E. Bakken},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {{GUTS:} {A} Framework for Adaptive and Configureable Grid User Trust
                  Service},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {84--99},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_6},
  doi          = {10.1007/978-3-642-22444-7\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/DionysiouGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FoleyAO10,
  author       = {Simon N. Foley and
                  Wayne Mac Adams and
                  Barry O'Sullivan},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Aggregating Trust Using Triangular Norms in the KeyNote Trust Management
                  System},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_7},
  doi          = {10.1007/978-3-642-22444-7\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/FoleyAO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GarciaJ10,
  author       = {Flavio D. Garcia and
                  Bart Jacobs},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Privacy-Friendly Energy-Metering via Homomorphic Encryption},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {226--238},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_15},
  doi          = {10.1007/978-3-642-22444-7\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GarciaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/GargP10,
  author       = {Deepak Garg and
                  Frank Pfenning},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Stateful Authorization Logic: - Proof Theory and a Case Study},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {210--225},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_14},
  doi          = {10.1007/978-3-642-22444-7\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/GargP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/Gomi10,
  author       = {Hidehito Gomi},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {An Authentication Trust Metric for Federated Identity Management Systems},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {116--131},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_8},
  doi          = {10.1007/978-3-642-22444-7\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/Gomi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/HartmannMOR10,
  author       = {Peter Hartmann and
                  Monika Maidl and
                  David von Oheimb and
                  Richard Robinson},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {A Case Study in Decentralized, Dynamic, Policy-Based, Authorization
                  and Trust Management - Automated Software Distribution for Airplanes},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_5},
  doi          = {10.1007/978-3-642-22444-7\_5},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/HartmannMOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/KrautsevichLMY10,
  author       = {Leanid Krautsevich and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Artsiom Yautsiukhin},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Influence of Attribute Freshness on Decision Making in Usage Control},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_3},
  doi          = {10.1007/978-3-642-22444-7\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/KrautsevichLMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SarrouhENS10,
  author       = {Nadim Sarrouh and
                  Florian Eilers and
                  Uwe Nestmann and
                  Ina Schieferdecker},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Defamation-Free Networks through User-Centered Data Control},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_12},
  doi          = {10.1007/978-3-642-22444-7\_12},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SarrouhENS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SasseEMM10,
  author       = {Ralf Sasse and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {Protocol Analysis Modulo Combination of Theories: {A} Case Study in
                  Maude-NPA},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_11},
  doi          = {10.1007/978-3-642-22444-7\_11},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SasseEMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SunZPAM10,
  author       = {Yanjie Sun and
                  Chenyi Zhang and
                  Jun Pang and
                  Baptiste Alcalde and
                  Sjouke Mauw},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner and
                  Javier L{\'{o}}pez},
  title        = {A Trust-Augmented Voting Scheme for Collaborative Privacy Management},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {132--146},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_9},
  doi          = {10.1007/978-3-642-22444-7\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SunZPAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2008,
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/244/suppl/C},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AgudoGL09,
  author       = {Isaac Agudo and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Javier L{\'{o}}pez},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {An Evolutionary Trust and Distrust Model},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {3--12},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.034},
  doi          = {10.1016/J.ENTCS.2009.07.034},
  timestamp    = {Thu, 09 Mar 2023 13:54:01 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AgudoGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AzzedinR09,
  author       = {Farag Azzedin and
                  Ahmad Ridha},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Recommendation Retrieval in Reputation Assessment for Peer-to-Peer
                  Systems},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {13--25},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.035},
  doi          = {10.1016/J.ENTCS.2009.07.035},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AzzedinR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BusnelKLSZ09,
  author       = {Pierre Busnel and
                  Paul El Khoury and
                  Keqin Li and
                  Ayda Sa{\"{\i}}dane and
                  Nicola Zannone},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {S{\&}D Pattern Deployment at Organizational Level: {A} Prototype
                  for Remote Healthcare System},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {27--39},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.036},
  doi          = {10.1016/J.ENTCS.2009.07.036},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BusnelKLSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Security of {RFID} Protocols - {A} Case Study},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {41--52},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.037},
  doi          = {10.1016/J.ENTCS.2009.07.037},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DimitrakosM09,
  author       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Preface},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.033},
  doi          = {10.1016/J.ENTCS.2009.07.033},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DimitrakosM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/FaisCL09,
  author       = {Davide Fais and
                  Maurizio Colombo and
                  Aliaksandr Lazouski},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {An Implementation of Role-Base Trust Management Extended with Weights
                  on Mobile Devices},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {53--65},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.038},
  doi          = {10.1016/J.ENTCS.2009.07.038},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/FaisCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Gutscher09,
  author       = {Andreas Gutscher},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Reasoning with Uncertain and Conflicting Opinions in Open Reputation
                  Systems},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {67--79},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.039},
  doi          = {10.1016/J.ENTCS.2009.07.039},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Gutscher09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KorsgaardJ09,
  author       = {Thomas Rune Korsgaard and
                  Christian Damsgaard Jensen},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Reengineering the Wikipedia for Reputation},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {81--94},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.040},
  doi          = {10.1016/J.ENTCS.2009.07.040},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/KorsgaardJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Moe09,
  author       = {Marie Elisabeth Gaup Moe},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Quantification of Anonymity for Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {95--107},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.041},
  doi          = {10.1016/J.ENTCS.2009.07.041},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Moe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/PretschnerSSW09,
  author       = {Alexander Pretschner and
                  Florian Sch{\"{u}}tz and
                  Christian Schaefer and
                  Thomas Walter},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Policy Evolution in Distributed Usage Control},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {109--123},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.042},
  doi          = {10.1016/J.ENTCS.2009.07.042},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/PretschnerSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/TatliL09,
  author       = {Emin Islam Tatli and
                  Stefan Lucks},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Mobile Identity Management Revisited},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {125--137},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.044},
  doi          = {10.1016/J.ENTCS.2009.07.044},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/TatliL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/TavakolifardK09,
  author       = {Mozhgan Tavakolifard and
                  Svein J. Knapskog},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {A Probabilistic Reputation Algorithm for Decentralized Multi-Agent
                  Environments},
  booktitle    = {Proceedings of the 4th International Workshop on Security and Trust
                  Management, STM@IFIPTM 2008, Trondheim, Norway, June 16-17, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {244},
  pages        = {139--149},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.07.043},
  doi          = {10.1016/J.ENTCS.2009.07.043},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/TavakolifardK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2007,
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/197/issue/2},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AndelY08,
  author       = {Todd R. Andel and
                  Alec Yasinsac},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {3--14},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.013},
  doi          = {10.1016/J.ENTCS.2007.12.013},
  timestamp    = {Mon, 13 Feb 2023 09:13:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AndelY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArenasABM08,
  author       = {Alvaro Arenas and
                  Benjamin Aziz and
                  Juan Bicarregui and
                  Brian Matthews},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Managing Conflicts of Interest in Virtual Organisations},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {45--56},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.016},
  doi          = {10.1016/J.ENTCS.2007.12.016},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArenasABM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BassoM08,
  author       = {Alessandro Basso and
                  Michele Miraglia},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Avoiding Massive Automated Voting in Internet Polls},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {149--157},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.024},
  doi          = {10.1016/J.ENTCS.2007.12.024},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BassoM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BhaskarCLMVY08,
  author       = {Raghav Bhaskar and
                  K. Chandrasekaran and
                  Satyanarayana V. Lokam and
                  Peter L. Montgomery and
                  Ramarathnam Venkatesan and
                  Yacov Yacobi},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Vulnerabilities in Anonymous Credential Systems},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {141--148},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.023},
  doi          = {10.1016/J.ENTCS.2007.12.023},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BhaskarCLMVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BianchiBFPT08,
  author       = {Giuseppe Bianchi and
                  Marco Bonola and
                  Vincenzo Falletta and
                  Francesco Saverio Proto and
                  Simone Teofili},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {The {SPARTA} Pseudonym and Authorization System},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {57--71},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.017},
  doi          = {10.1016/J.ENTCS.2007.12.017},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BianchiBFPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BiskupHW08,
  author       = {Joachim Biskup and
                  Julia Hielscher and
                  Sandra Wortmann},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {A Trust- and Property-based Access Control Model},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {169--177},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.026},
  doi          = {10.1016/J.ENTCS.2007.12.026},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BiskupHW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BistarelliPT08,
  author       = {Stefano Bistarelli and
                  Pamela Peretti and
                  Irina Trubitsyna},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Analyzing Security Scenarios Using Defence Trees and Answer Set Programming},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {121--129},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.021},
  doi          = {10.1016/J.ENTCS.2007.12.021},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BistarelliPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CeelenMR08,
  author       = {Pieter Ceelen and
                  Sjouke Mauw and
                  Sasa Radomirovic},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {31--43},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.015},
  doi          = {10.1016/J.ENTCS.2007.12.015},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CeelenMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CompagnaLM08,
  author       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Preface},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2008.01.001},
  doi          = {10.1016/J.ENTCS.2008.01.001},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CompagnaLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CordascoW08,
  author       = {Jared Cordasco and
                  Susanne Wetzel},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Cryptographic Versus Trust-based Methods for {MANET} Routing Security},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {131--140},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.022},
  doi          = {10.1016/J.ENTCS.2007.12.022},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CordascoW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DeursenKP08,
  author       = {Ton van Deursen and
                  R. Paul Koster and
                  Milan Petkovic},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Hedaquin: {A} Reputation-based Health Data Quality Indicator},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {159--167},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.025},
  doi          = {10.1016/J.ENTCS.2007.12.025},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DeursenKP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LenziniBH08,
  author       = {Gabriele Lenzini and
                  Mortaza S. Bargh and
                  Bob Hulsebosch},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Trust-enhanced Security in Location-based Adaptive Authentication},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {105--119},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.020},
  doi          = {10.1016/J.ENTCS.2007.12.020},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/LenziniBH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/RefsdalS08,
  author       = {Atle Refsdal and
                  Ketil St{\o}len},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Extending {UML} Sequence Diagrams to Model Trust-dependent Behavior
                  With the Aim to Support Risk Analysis},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {15--29},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.014},
  doi          = {10.1016/J.ENTCS.2007.12.014},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/RefsdalS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Wierzbicki08,
  author       = {Adam Wierzbicki},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {The Case for Fairness of Trust Management},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {73--89},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.018},
  doi          = {10.1016/J.ENTCS.2007.12.018},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Wierzbicki08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ZandbeltHBA08,
  author       = {J. F. Zandbelt and
                  R. J. Hulsebosch and
                  Mortaza S. Bargh and
                  R. Arends},
  editor       = {Luca Compagna and
                  Volkmar Lotz and
                  Fabio Massacci},
  title        = {Trusted Directory Services for Secure Internet Connectivity: Transport
                  Layer Security using {DNSSEC}},
  booktitle    = {Proceedings of the 3rd International Workshop on Security and Trust
                  Management, STM@ESORICS 2007, Dresden, Germany, September 27, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {197},
  number       = {2},
  pages        = {91--103},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.12.019},
  doi          = {10.1016/J.ENTCS.2007.12.019},
  timestamp    = {Mon, 13 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ZandbeltHBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2006,
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/179/suppl/C},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/AdamKPS07,
  author       = {Nabil R. Adam and
                  Ahmet Kozanoglu and
                  Aabhas V. Paliwal and
                  Basit Shafiq},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Secure Information Sharing in a Virtual Multi-Agency Team Environment},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {97--109},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.034},
  doi          = {10.1016/J.ENTCS.2006.08.034},
  timestamp    = {Tue, 24 Jan 2023 13:29:56 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/AdamKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Androutsellis-TheotokisSV07,
  author       = {Stephanos Androutsellis{-}Theotokis and
                  Diomidis Spinellis and
                  Vasileios Vlachos},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {The MoR-Trust Distributed Trust Management System: Design and Simulation
                  Results},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {3--15},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.032},
  doi          = {10.1016/J.ENTCS.2006.11.032},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Androutsellis-TheotokisSV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BelsisGK07,
  author       = {Petros Belsis and
                  Stefanos Gritzalis and
                  Sokratis K. Katsikas},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {75--86},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.032},
  doi          = {10.1016/J.ENTCS.2006.08.032},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BelsisGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Degerlund07,
  author       = {Fredrik Degerlund},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Trust Mass, Volume and Density - a Novel Approach to Reasoning about
                  Trust},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {87--96},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.033},
  doi          = {10.1016/J.ENTCS.2006.08.033},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Degerlund07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DeriazS07,
  author       = {Michel Deriaz and
                  Jean{-}Marc Seigneur},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Towards Trustworthy Spatial Messaging},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {123--133},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.036},
  doi          = {10.1016/J.ENTCS.2006.08.036},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DeriazS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/EtalleS07,
  author       = {Sandro Etalle and
                  Pierangela Samarati},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Preface},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.031},
  doi          = {10.1016/J.ENTCS.2006.11.031},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/EtalleS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HassanMW07,
  author       = {Mohammad Waseem Hassan and
                  Richard McClatchey and
                  Ian Willers},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {A Scalable Evidence Based Self-Managing Framework for Trust Management},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {59--73},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.031},
  doi          = {10.1016/J.ENTCS.2006.08.031},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/HassanMW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/KarabulutKMRY07,
  author       = {Y{\"{u}}cel Karabulut and
                  Florian Kerschbaum and
                  Fabio Massacci and
                  Philip Robinson and
                  Artsiom Yautsiukhin},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Security and Trust in {IT} Business Outsourcing: a Manifesto},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {47--58},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.030},
  doi          = {10.1016/J.ENTCS.2006.08.030},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/KarabulutKMRY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LenziniTM07,
  author       = {Gabriele Lenzini and
                  Andrew Tokmakoff and
                  Johan Muskens},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Managing Trustworthiness in Component-based Embedded Systems},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {143--155},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.038},
  doi          = {10.1016/J.ENTCS.2006.08.038},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/LenziniTM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MartinelliM07a,
  author       = {Fabio Martinelli and
                  Ilaria Matteucci},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Through Modeling to Synthesis of Security Automata},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {31--46},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.029},
  doi          = {10.1016/J.ENTCS.2006.08.029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/MartinelliM07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MjolsnesT07,
  author       = {Stig Fr. Mj{\o}lsnes and
                  Marius Teigen},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {A Survey on Trust and Privacy Negotiability in the Norwegian Mobile
                  Telecom Market},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {135--142},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.037},
  doi          = {10.1016/J.ENTCS.2006.08.037},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MjolsnesT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/StrufeWS07,
  author       = {Thorsten Strufe and
                  Jens Wildhagen and
                  G{\"{u}}nter Sch{\"{a}}fer},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Towards the Construction of Attack Resistant and Efficient Overlay
                  Streaming Topologies},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {111--121},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.08.035},
  doi          = {10.1016/J.ENTCS.2006.08.035},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/StrufeWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/WeiM07,
  author       = {Songjie Wei and
                  Jelena Mirkovic},
  editor       = {Sandro Etalle and
                  Pierangela Samarati},
  title        = {Building Reputations for Internet Clients},
  booktitle    = {Proceedings of the Second International Workshop on Security and Trust
                  Management, {STM} 2006, Hamburg, Germany, September 20-21, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {179},
  pages        = {17--30},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.033},
  doi          = {10.1016/J.ENTCS.2006.11.033},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/WeiM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2005,
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/157/issue/3},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stm/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CvrcekS06,
  author       = {Daniel Cvrcek and
                  Petr Svenda},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Smart Dust Security - Key Infection Revisited},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {11--25},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.043},
  doi          = {10.1016/J.ENTCS.2005.09.043},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CvrcekS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CzenkoTDEHH06,
  author       = {Marcin Czenko and
                  Ha Tran and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Jerry den Hartog},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Nonmonotonic Trust Management for {P2P} Applications},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {113--130},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.037},
  doi          = {10.1016/J.ENTCS.2005.09.037},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CzenkoTDEHH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DamianiVSV06,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Marco Viviani},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {A WOWA-based Aggregation Technique on Trust Values Connected to Metadata},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {131--142},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.036},
  doi          = {10.1016/J.ENTCS.2005.09.036},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/DamianiVSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Gollmann06,
  author       = {Dieter Gollmann},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Why Trust is Bad for Security},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {3--9},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.044},
  doi          = {10.1016/J.ENTCS.2005.09.044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/Gollmann06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GorrieriMP06,
  author       = {Roberto Gorrieri and
                  Fabio Martinelli and
                  Marinella Petrocchi},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {A Formalization of Credit and Responsibility Within the {GNDC} Schema},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {61--78},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.040},
  doi          = {10.1016/J.ENTCS.2005.09.040},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GorrieriMP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GrayJOWSC06,
  author       = {Elizabeth Gray and
                  Christian Damsgaard Jensen and
                  Paul O'Connell and
                  Stefan Weber and
                  Jean{-}Marc Seigneur and
                  Yong Chen},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Trust Evolution Policies for Security in Collaborative Ad Hoc Applications},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {95--111},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.038},
  doi          = {10.1016/J.ENTCS.2005.09.038},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/GrayJOWSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MauwIC06,
  author       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Preface},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.045},
  doi          = {10.1016/J.ENTCS.2005.09.045},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MauwIC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/McDonaldY06,
  author       = {Jeffrey Todd McDonald and
                  Alec Yasinsac},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Application Security Models for Mobile Agent Systems},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {43--59},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.041},
  doi          = {10.1016/J.ENTCS.2005.09.041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/McDonaldY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/OrzanV06,
  author       = {Simona Orzan and
                  Erik P. de Vink},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Multiparty Contract Signing Over a Reliable Network},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {27--41},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.042},
  doi          = {10.1016/J.ENTCS.2005.09.042},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/OrzanV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/QuillinanF06,
  author       = {Thomas B. Quillinan and
                  Simon N. Foley},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {Synchronisation in Trust Management Using Push Authorisation},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {143--158},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.035},
  doi          = {10.1016/J.ENTCS.2005.09.035},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/QuillinanF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Schmidt-Samoa06a,
  author       = {Katja Schmidt{-}Samoa},
  editor       = {Sjouke Mauw and
                  Val{\'{e}}rie Issarny and
                  Cas Cremers},
  title        = {A New Rabin-type Trapdoor Permutation Equivalent to Factoring},
  booktitle    = {Proceedings of the First International Workshop on Security and Trust
                  Management, {STM} 2005, Milan, Italy, September 15, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {157},
  number       = {3},
  pages        = {79--94},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.09.039},
  doi          = {10.1016/J.ENTCS.2005.09.039},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Schmidt-Samoa06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics