跳至内容
Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers 線上預覽
關閉線上預覽
正在查...

Security and trust management : 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers

作者: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
出版商: Berlin ; New York : Springer, ©2013.
叢書: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   電子書 : 文獻 : 會議刊物 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
Conference proceedings
Congresses
資料類型: 會議刊物, 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Audun Jøsang; Pierangela Samarati; Marinella Petrocchi
ISBN: 9783642380044 3642380042 3642380034 9783642380037
OCLC系統控制編碼: 841915885
描述: 1 online resource (x, 320 p.) : ill.
内容: Policy Enforcement and Monitoring. Cost-Aware Runtime Enforcement of Security Policies / Peter Drábik, Fabio Martinelli, Charles Morisset --
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors / Yannis Mallios ... [et al.] --
Lazy Security Controllers / Giulio Caravagna, Gabriele Costa, Giovanni Pardini --
Access Control. Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities / Michele Barletta, Silvio Ranise, Luca Viganò --
Labeled Goal-Directed Search in Access Control Logic / Valerio Genovese, Deepak Garg, Daniele Rispoli --
A Use-Based Approach for Enhancing UCON / Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis --
Analysis of Communicating Authorization Policies / Simone Frau, Mohammad Torabi Dashti --
Trust, Reputation, and Privacy. Building Trust and Reputation In: A Development Framework for Trust Models Implementation / Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez --
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures / Jean-Guillaume Dumas, Hicham Hossayni --
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy / Meilof Veeningen, Benne de Weger, Nicola Zannone --
Distributed Systems and Physical Security. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification / Nelson Nazzicari ... [et al.] --
DOT-COM: Decentralized Online Trading and COMmerce / Moti Geva, Amir Herzberg --
Formalizing Physical Security Procedures / Catherine Meadows, Dusko Pavlovic --
Authentication. A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items / Sjouke Mauw, Selwyn Piramuthu --
Authenticating Email Search Results / Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia --
Software Authentication to Enhance Trust in Body Sensor Networks / Joep de Groot ... [et al.] --
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM / Robert Künnemann, Graham Steel --
Security Policies. Boosting Model Checking to Analyse Large ARBAC Policies / Silvio Ranise, Anh Truong, Alessandro Armando --
Constrained Role Mining / Carlo Blundo, Stelvio Cimato --
A Datalog Semantics for Paralocks / Bart van Delft, Niklas Broberg, David Sands.
叢書名: Lecture notes in computer science, 7783.; LNCS sublibrary., SL 4,, Security and cryptology.
其他題名: STM 2012
責任: Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.).

摘要:

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/841915885>
library:oclcnum"841915885"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:Book
rdf:typeschema:MediaObject
rdf:valueUnknown value: cnp
rdf:valueUnknown value: dct
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"STM 2012"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1371778227>
schema:genre"Electronic books"
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Security and trust management 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012 : revised selected papers"
schema:numberOfPages"320"
schema:publication
schema:publisher
schema:url<http://dx.doi.org/10.1007/978-3-642-38004-4>
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.