Description |
1 online resource (x, 238 pages) |
Series |
Lecture notes in computer science, 0302-9743 ; 7170 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7170.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together / Bjørnar Solhaug and Ketil Stølen -- Trust Extortion on the Internet / Audun Jøsang -- Trust Areas: A Security Paradigm for the Future Internet / Carsten Rudolph -- Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security / Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang and Pam Briggs, et al. -- A Proof-Carrying File System with Revocable and Use-Once Certificates / Jamie Morgenstern, Deepak Garg and Frank Pfenning -- New Modalities for Access Control Logics: Permission, Control and Ratification / Valerio Genovese and Deepak Garg -- Security Notions of Biometric Remote Authentication Revisited / Neyire Deniz Sarier -- Hiding the Policy in Cryptographic Access Control / Sascha Müller and Stefan Katzenbeisser -- Location Privacy in Relation to Trusted Peers / Klaus Rechert and Benjamin Greschbach -- Fairness in Non-Repudiation Protocols / Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen -- Risk-Aware Role-Based Access Control / Liang Chen and Jason Crampton -- Automated Analysis of Infinite State Workflows with Access Control Policies / Alessandro Armando and Silvio Ranise -- The Role of Data Integrity in EU Digital Signature Legislation -- Achieving Statutory Trust for Sanitizable Signature Schemes / Henrich C. Pöhls and Focke Höhne -- Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms / Ulrich Greveler, Benjamin Justus and Dennis Löhr -- Secure Architecure for the Integration of RFID and Sensors in Personal Networks / Pablo Najera, Rodrigo Roman and Javier Lopez -- Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources / Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith |
Summary |
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Management of Computing and Information Systems |
|
Systems and Data Security |
|
Information Systems Applications (incl. Internet) |
|
informatiesystemen |
|
internet |
|
computers |
|
samenleving |
|
society |
|
computerwetenschappen |
|
computer sciences |
|
computernetwerken |
|
computer networks |
|
gegevensbeheer |
|
data management |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
In |
Springer eBooks |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security.
|
|
Computer Security
|
|
Electronic Data Processing
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Meadows, Catherine.
|
|
Fernandez-Gago, Carmen.
|
ISBN |
9783642299636 |
|
3642299636 |
|
3642299628 |
|
9783642299629 |
|