Security and trust management [electronic resource] : 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers / Catherine Meadows, Carmen Fernandez-Gago (eds.)
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised f...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | , |
Other title: | STM 2011. |
Format: | Electronic Conference Proceeding eBook |
Language: | English |
Published: |
Berlin ; New York :
Springer,
©2012.
|
Series: | Lecture notes in computer science ;
7170. LNCS sublibrary. Security and cryptology. |
Subjects: |
Table of Contents:
- Uncertainty, Subjectivity, Trust and Risk: How It All Fits together / Bjørnar Solhaug and Ketil Stølen
- Trust Extortion on the Internet / Audun Jøsang
- Trust Areas: A Security Paradigm for the Future Internet / Carsten Rudolph
- Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security / Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang and Pam Briggs, et al.
- A Proof-Carrying File System with Revocable and Use-Once Certificates / Jamie Morgenstern, Deepak Garg and Frank Pfenning
- New Modalities for Access Control Logics: Permission, Control and Ratification / Valerio Genovese and Deepak Garg
- Security Notions of Biometric Remote Authentication Revisited / Neyire Deniz Sarier
- Hiding the Policy in Cryptographic Access Control / Sascha Müller and Stefan Katzenbeisser
- Location Privacy in Relation to Trusted Peers / Klaus Rechert and Benjamin Greschbach
- Fairness in Non-Repudiation Protocols / Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen
- Risk-Aware Role-Based Access Control / Liang Chen and Jason Crampton
- Automated Analysis of Infinite State Workflows with Access Control Policies / Alessandro Armando and Silvio Ranise
- The Role of Data Integrity in EU Digital Signature Legislation
- Achieving Statutory Trust for Sanitizable Signature Schemes / Henrich C. Pöhls and Focke Höhne
- Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms / Ulrich Greveler, Benjamin Justus and Dennis Löhr
- Secure Architecure for the Integration of RFID and Sensors in Personal Networks / Pablo Najera, Rodrigo Roman and Javier Lopez
- Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources / Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith.