跳到内容
Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers 预览资料
关闭预览资料
正在查...

Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers

著者: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
出版商: Berlin ; New York : Springer, ©2013.
丛书: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   电子图书 : 文献 : 会议刊物 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Conference proceedings
Congresses
材料类型: 会议刊物, 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
ISBN: 9783642380044 3642380042 3642380034 9783642380037
OCLC号码: 841915885
描述: 1 online resource (x, 320 p.) : ill.
内容: Policy Enforcement and Monitoring. Cost-Aware Runtime Enforcement of Security Policies / Peter Drábik, Fabio Martinelli, Charles Morisset --
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors / Yannis Mallios ... [et al.] --
Lazy Security Controllers / Giulio Caravagna, Gabriele Costa, Giovanni Pardini --
Access Control. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities / Michele Barletta, Silvio Ranise, Luca Viganò --
Labeled Goal-Directed Search in Access Control Logic / Valerio Genovese, Deepak Garg, Daniele Rispoli --
A Use-Based Approach for Enhancing UCON / Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis --
Analysis of Communicating Authorization Policies / Simone Frau, Mohammad Torabi Dashti --
Trust, Reputation, and Privacy. Building Trust and Reputation In: A Development Framework for Trust Models Implementation / Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez --
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures / Jean-Guillaume Dumas, Hicham Hossayni --
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy / Meilof Veeningen, Benne de Weger, Nicola Zannone --
Distributed Systems and Physical Security. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification / Nelson Nazzicari ... [et al.] --
DOT-COM: Decentralized Online Trading and COMmerce / Moti Geva, Amir Herzberg --
Formalizing Physical Security Procedures / Catherine Meadows, Dusko Pavlovic --
Authentication. A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items / Sjouke Mauw, Selwyn Piramuthu --
Authenticating Email Search Results / Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia --
Software Authentication to Enhance Trust in Body Sensor Networks / Joep de Groot ... [et al.] --
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM / Robert Künnemann, Graham Steel --
Security Policies. Boosting Model Checking to Analyse Large ARBAC Policies / Silvio Ranise, Anh Truong, Alessandro Armando --
Constrained Role Mining / Carlo Blundo, Stelvio Cimato --
A Datalog Semantics for Paralocks / Bart van Delft, Niklas Broberg, David Sands.
丛书名: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
其他题名: STM 2012
责任: Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.).

摘要:

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/841915885>
library:oclcnum"841915885"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: cnp
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"STM 2012"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1371778227>
schema:genre"Electronic books"
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Security and trust management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers"
schema:numberOfPages"320"
schema:publication
schema:publisher
schema:url<http://dx.doi.org/10.1007/978-3-642-38004-4>
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.