Security and trust management [electronic resource] : 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers / Catherine Meadows, Carmen Fernandez-Gago (eds.)

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised f...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: STM (Conference) Copenhagen, Denmark)
Other Authors: Meadows, Catherine, Fernandez-Gago, Carmen
Other title:STM 2011.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 7170.
LNCS sublibrary. Security and cryptology.
Subjects:

MARC

LEADER 00000cam a2200000xa 4500
001 b7110844
006 m o d
007 cr |||||||||||
008 120509s2012 gw ob 101 0 eng d
005 20240418144335.6
019 |a 793220327  |a 847508220  |a 1066678795 
020 |a 9783642299636  |q (electronic bk.) 
020 |a 3642299636  |q (electronic bk.) 
020 |a 3642299628 
020 |a 9783642299629 
020 |z 9783642299629 
024 7 |a 10.1007/978-3-642-29963-6 
035 |a (OCoLC)spr793341847 
035 |a (OCoLC)793341847  |z (OCoLC)793220327  |z (OCoLC)847508220  |z (OCoLC)1066678795 
037 |a spr978-3-642-29963-6 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COO  |d ZMC  |d UKMGB  |d OHI  |d E7B  |d MEAUC  |d NLGGC  |d OCLCF  |d BEDGE  |d OCLCO  |d YDXCP  |d AU@  |d OCL  |d OCLCO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d STF  |d ESU  |d UAB  |d OCLCQ  |d VT2  |d IOG  |d OCLCA  |d BUF  |d REB  |d CEF  |d U3W  |d WYU  |d YOU  |d TKN  |d LEAUB  |d OCLCQ  |d WURST  |d LUN  |d AJS  |d OCLCQ 
049 |a GWRE 
050 4 |a QA76.9.A25  |b S76 2011 
111 2 |a STM (Conference)  |n (7th :  |d 2011 :  |c Copenhagen, Denmark)  |0 http://id.loc.gov/authorities/names/nb2012014715. 
245 1 0 |a Security and trust management  |h [electronic resource] :  |b 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers /  |c Catherine Meadows, Carmen Fernandez-Gago (eds.) 
246 3 |a STM 2011. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource (x, 238 pages) 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7170. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
504 |a Includes bibliographical references and author index. 
505 0 0 |t Uncertainty, Subjectivity, Trust and Risk: How It All Fits together /  |r Bjørnar Solhaug and Ketil Stølen --  |t Trust Extortion on the Internet /  |r Audun Jøsang --  |t Trust Areas: A Security Paradigm for the Future Internet /  |r Carsten Rudolph --  |t Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security /  |r Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang and Pam Briggs, et al. --  |t A Proof-Carrying File System with Revocable and Use-Once Certificates /  |r Jamie Morgenstern, Deepak Garg and Frank Pfenning --  |t New Modalities for Access Control Logics: Permission, Control and Ratification /  |r Valerio Genovese and Deepak Garg --  |t Security Notions of Biometric Remote Authentication Revisited /  |r Neyire Deniz Sarier --  |t Hiding the Policy in Cryptographic Access Control /  |r Sascha Müller and Stefan Katzenbeisser --  |t Location Privacy in Relation to Trusted Peers /  |r Klaus Rechert and Benjamin Greschbach --  |t Fairness in Non-Repudiation Protocols /  |r Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen --  |t Risk-Aware Role-Based Access Control /  |r Liang Chen and Jason Crampton --  |t Automated Analysis of Infinite State Workflows with Access Control Policies /  |r Alessandro Armando and Silvio Ranise --  |t The Role of Data Integrity in EU Digital Signature Legislation -- Achieving Statutory Trust for Sanitizable Signature Schemes /  |r Henrich C. Pöhls and Focke Höhne --  |t Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms /  |r Ulrich Greveler, Benjamin Justus and Dennis Löhr --  |t Secure Architecure for the Integration of RFID and Sensors in Personal Networks /  |r Pablo Najera, Rodrigo Roman and Javier Lopez --  |t Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources /  |r Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Meadows, Catherine.  |0 http://id.loc.gov/authorities/names/n94044474  |1 http://isni.org/isni/0000000042486484. 
700 1 |a Fernandez-Gago, Carmen.  |0 http://id.loc.gov/authorities/names/nb2012014718  |1 http://isni.org/isni/000000037127233X. 
776 0 8 |i Printed edition:  |z 9783642299629. 
830 0 |a Lecture notes in computer science ;  |v 7170.  |0 http://id.loc.gov/authorities/names/n42015162. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology.  |0 http://id.loc.gov/authorities/names/no2007042442. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-29963-6  |z Full Text (via Springer) 
907 |a .b71108440  |b 04-01-21  |c 05-22-12 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
998 |a web  |b 03-31-21  |c b  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b71108440  |b 03-31-21  |c 05-22-12 
944 |a MARS - RDA ENRICHED 
956 |b Springer Nature - Springer Computer Science eBooks 2014 English International 
915 |a - 
956 |b Springer Nature - Springer Computer Science eBooks 2014 English International 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2014 English International 
999 f f |i 376d0b47-de97-527b-8b08-bdf0e92459ce  |s 5b7a24fe-3c8c-5f4a-9a68-36f11af46f53 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 S76 2011  |h Library of Congress classification  |i Ebooks, Prospector  |n 1