Security and trust management [electronic resource] : 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised selected papers / Catherine Meadows, Carmen Fernandez-Gago (eds.)

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised f...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: STM (Conference) Copenhagen, Denmark)
Other Authors: Meadows, Catherine, Fernandez-Gago, Carmen
Other title:STM 2011.
Format: Electronic Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 7170.
LNCS sublibrary. Security and cryptology.
Subjects:
Table of Contents:
  • Uncertainty, Subjectivity, Trust and Risk: How It All Fits together / Bjørnar Solhaug and Ketil Stølen
  • Trust Extortion on the Internet / Audun Jøsang
  • Trust Areas: A Security Paradigm for the Future Internet / Carsten Rudolph
  • Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security / Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang and Pam Briggs, et al.
  • A Proof-Carrying File System with Revocable and Use-Once Certificates / Jamie Morgenstern, Deepak Garg and Frank Pfenning
  • New Modalities for Access Control Logics: Permission, Control and Ratification / Valerio Genovese and Deepak Garg
  • Security Notions of Biometric Remote Authentication Revisited / Neyire Deniz Sarier
  • Hiding the Policy in Cryptographic Access Control / Sascha Müller and Stefan Katzenbeisser
  • Location Privacy in Relation to Trusted Peers / Klaus Rechert and Benjamin Greschbach
  • Fairness in Non-Repudiation Protocols / Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen
  • Risk-Aware Role-Based Access Control / Liang Chen and Jason Crampton
  • Automated Analysis of Infinite State Workflows with Access Control Policies / Alessandro Armando and Silvio Ranise
  • The Role of Data Integrity in EU Digital Signature Legislation
  • Achieving Statutory Trust for Sanitizable Signature Schemes / Henrich C. Pöhls and Focke Höhne
  • Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms / Ulrich Greveler, Benjamin Justus and Dennis Löhr
  • Secure Architecure for the Integration of RFID and Sensors in Personal Networks / Pablo Najera, Rodrigo Roman and Javier Lopez
  • Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources / Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith.