omitir hasta el contenido
Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers Ver este material de antemano
CerrarVer este material de antemano
Chequeando…

Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers

Autor: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
Editorial: Berlin ; New York : Springer, ©2013.
Serie: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
Edición/Formato:   Libro-e : Documento : Publicación de conferencia : Inglés (eng)Ver todas las ediciones y todos los formatos
Base de datos:WorldCat
Resumen:
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections  Leer más
Calificación:

(todavía no calificado) 0 con reseñas - Ser el primero.

Temas
Más materiales como éste

 

Encontrar un ejemplar en línea

Enlaces a este material

Encontrar un ejemplar en la biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que tienen este material…

Detalles

Género/Forma: Electronic books
Conference proceedings
Congresses
Tipo de material: Publicación de conferencia, Documento, Recurso en Internet
Tipo de documento: Recurso en Internet, Archivo de computadora
Todos autores / colaboradores: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
ISBN: 9783642380044 3642380042
Número OCLC: 841915885
Descripción: 1 online resource (x, 320 p.) : ill.
Contenido: Policy Enforcement and Monitoring. Cost-Aware Runtime Enforcement of Security Policies / Peter Drábik, Fabio Martinelli, Charles Morisset --
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors / Yannis Mallios ... [et al.] --
Lazy Security Controllers / Giulio Caravagna, Gabriele Costa, Giovanni Pardini --
Access Control. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities / Michele Barletta, Silvio Ranise, Luca Viganò --
Labeled Goal-Directed Search in Access Control Logic / Valerio Genovese, Deepak Garg, Daniele Rispoli --
A Use-Based Approach for Enhancing UCON / Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis --
Analysis of Communicating Authorization Policies / Simone Frau, Mohammad Torabi Dashti --
Trust, Reputation, and Privacy. Building Trust and Reputation In: A Development Framework for Trust Models Implementation / Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez --
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures / Jean-Guillaume Dumas, Hicham Hossayni --
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy / Meilof Veeningen, Benne de Weger, Nicola Zannone --
Distributed Systems and Physical Security. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification / Nelson Nazzicari ... [et al.] --
DOT-COM: Decentralized Online Trading and COMmerce / Moti Geva, Amir Herzberg --
Formalizing Physical Security Procedures / Catherine Meadows, Dusko Pavlovic --
Authentication. A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items / Sjouke Mauw, Selwyn Piramuthu --
Authenticating Email Search Results / Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia --
Software Authentication to Enhance Trust in Body Sensor Networks / Joep de Groot ... [et al.] --
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM / Robert Künnemann, Graham Steel --
Security Policies. Boosting Model Checking to Analyse Large ARBAC Policies / Silvio Ranise, Anh Truong, Alessandro Armando --
Constrained Role Mining / Carlo Blundo, Stelvio Cimato --
A Datalog Semantics for Paralocks / Bart van Delft, Niklas Broberg, David Sands.
Título de la serie: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
Otros títulos: STM 2012
Responsabilidad: Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.).
Más información:

Resumen:

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Reseñas

Reseñas contribuidas por usuarios
Recuperando reseñas de GoodReads…
Recuperando reseñas de DOGObooks…

Etiquetas

Ser el primero.
Confirmar este pedido

Ya ha pedido este material. Escoja OK si desea procesar el pedido de todos modos.

Datos enlazados


<http://www.worldcat.org/oclc/841915885>
library:oclcnum"841915885"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/841915885>
rdf:typeschema:Book
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872298>
rdf:typeschema:Intangible
schema:name"Computer networks--Access control"
schema:name"Computer networks--Access control."
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"
schema:name"Computer networks--Security measures."
schema:about
schema:about
schema:about
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1371778227>
schema:genre"Electronic books."
schema:genre"Conference proceedings."
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:name"STM 2012"
schema:name"Security and trust management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers"
schema:numberOfPages"320"
schema:publisher
schema:url<http://dx.doi.org/10.1007/978-3-642-38004-4>
schema:url
schema:workExample

Content-negotiable representations

Cerrar ventana

Inicie una sesión con WorldCat 

¿No tienes una cuenta? Puede fácilmente crear una cuenta gratuita.