default search action
Search dblp for Publications
export results for "toc:db/conf/stm/stm2012.bht:"
@proceedings{DBLP:conf/stm/2012, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38004-4}, doi = {10.1007/978-3-642-38004-4}, isbn = {978-3-642-38003-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BarlettaRV12, author = {Michele Barletta and Silvio Ranise and Luca Vigan{\`{o}}}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {49--64}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_4}, doi = {10.1007/978-3-642-38004-4\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BarlettaRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/BlundoC12, author = {Carlo Blundo and Stelvio Cimato}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Constrained Role Mining}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {289--304}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_19}, doi = {10.1007/978-3-642-38004-4\_19}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/BlundoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/CaravagnaCP12, author = {Giulio Caravagna and Gabriele Costa and Giovanni Pardini}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Lazy Security Controllers}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {33--48}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_3}, doi = {10.1007/978-3-642-38004-4\_3}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/CaravagnaCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DelftBS12, author = {Bart van Delft and Niklas Broberg and David Sands}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A Datalog Semantics for Paralocks}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {305--320}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_20}, doi = {10.1007/978-3-642-38004-4\_20}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DelftBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DrabikMM12, author = {Peter Dr{\'{a}}bik and Fabio Martinelli and Charles Morisset}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Cost-Aware Runtime Enforcement of Security Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_1}, doi = {10.1007/978-3-642-38004-4\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DrabikMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/DumasH12, author = {Jean{-}Guillaume Dumas and Hicham Hossayni}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {129--144}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_9}, doi = {10.1007/978-3-642-38004-4\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/DumasH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FrauD12, author = {Simone Frau and Mohammad Torabi Dashti}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Analysis of Communicating Authorization Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {97--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_7}, doi = {10.1007/978-3-642-38004-4\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/FrauD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GenoveseGR12, author = {Valerio Genovese and Deepak Garg and Daniele Rispoli}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Labeled Goal-Directed Search in Access Control Logic}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {65--80}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_5}, doi = {10.1007/978-3-642-38004-4\_5}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GenoveseGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GevaH12, author = {Moti Geva and Amir Herzberg}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {{DOT-COM:} Decentralized Online Trading and COMmerce}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {177--192}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_12}, doi = {10.1007/978-3-642-38004-4\_12}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GevaH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrompanopoulosGM12, author = {Christos Grompanopoulos and Antonios Gouglidis and Ioannis Mavridis}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A Use-Based Approach for Enhancing {UCON}}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {81--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_6}, doi = {10.1007/978-3-642-38004-4\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrompanopoulosGM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/GrootBLLV12, author = {Joep A. de Groot and Vinh T. Bui and Jean{-}Paul M. G. Linnartz and Johan Lukkien and Richard Verhoeven}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Software Authentication to Enhance Trust in Body Sensor Networks}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {241--256}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_16}, doi = {10.1007/978-3-642-38004-4\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/GrootBLLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/KunnemannS12, author = {Robert K{\"{u}}nnemann and Graham Steel}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {257--272}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_17}, doi = {10.1007/978-3-642-38004-4\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/KunnemannS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MalliosBKL12, author = {Yannis Mallios and Lujo Bauer and Dilsun Kirli Kaynar and Jay Ligatti}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {17--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_2}, doi = {10.1007/978-3-642-38004-4\_2}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MalliosBKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MauwP12, author = {Sjouke Mauw and Selwyn Piramuthu}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {209--224}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_14}, doi = {10.1007/978-3-642-38004-4\_14}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MauwP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MeadowsP12, author = {Catherine Meadows and Dusko Pavlovic}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formalizing Physical Security Procedures}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {193--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_13}, doi = {10.1007/978-3-642-38004-4\_13}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MeadowsP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MoyanoGL12, author = {Francisco Moyano and M. Carmen Fern{\'{a}}ndez Gago and Javier L{\'{o}}pez}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Building Trust and Reputation In: {A} Development Framework for Trust Models Implementation}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {113--128}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_8}, doi = {10.1007/978-3-642-38004-4\_8}, timestamp = {Thu, 04 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stm/MoyanoGL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NazzicariASJ12, author = {Nelson Nazzicari and Javier Almillategui and Angelos Stavrou and Sushil Jajodia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_11}, doi = {10.1007/978-3-642-38004-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/OhrimenkoRT12, author = {Olga Ohrimenko and Hobart Reynolds and Roberto Tamassia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Authenticating Email Search Results}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {225--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_15}, doi = {10.1007/978-3-642-38004-4\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/OhrimenkoRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/RaniseTA12, author = {Silvio Ranise and Anh Tuan Truong and Alessandro Armando}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Boosting Model Checking to Analyse Large {ARBAC} Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {273--288}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_18}, doi = {10.1007/978-3-642-38004-4\_18}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/RaniseTA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/VeeningenWZ12, author = {Meilof Veeningen and Benne de Weger and Nicola Zannone}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formal Modelling of (De)Pseudonymisation: {A} Case Study in Health Care Privacy}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {145--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_10}, doi = {10.1007/978-3-642-38004-4\_10}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/VeeningenWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.