


default search action
STM 2010: Athens, Greece
- Jorge Cuéllar, Gilles Barthe
, Alexander Pretschner, Javier López:
Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6710, Springer 2011, ISBN 978-3-642-22443-0 - Jason Crampton, Charles Morisset:
An Auto-delegation Mechanism for Access Control Systems. 1-16 - Alessandro Armando
, Silvio Ranise
:
Automated Symbolic Analysis of ARBAC-Policies. 17-34 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin:
Influence of Attribute Freshness on Decision Making in Usage Control. 35-50 - Clara Bertolissi, Maribel Fernández:
Rewrite Specifications of Access Control Policies in Distributed Environments. 51-67 - Peter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson:
A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes. 68-83 - Ioanna Dionysiou
, K. Harald Gjermundrød
, David E. Bakken:
GUTS: A Framework for Adaptive and Configureable Grid User Trust Service. 84-99 - Simon N. Foley
, Wayne Mac Adams, Barry O'Sullivan
:
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System. 100-115 - Hidehito Gomi:
An Authentication Trust Metric for Federated Identity Management Systems. 116-131 - Yanjie Sun, Chenyi Zhang
, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. 132-146 - Md. Abdul Based, Stig Fr. Mjølsnes
:
Universally Composable NIZK Protocol in an Internet Voting Scheme. 147-162 - Ralf Sasse
, Santiago Escobar
, Catherine Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. 163-178 - Nadim Sarrouh, Florian Eilers, Uwe Nestmann, Ina Schieferdecker
:
Defamation-Free Networks through User-Centered Data Control. 179-193 - Rafael Accorsi, Claus Wonnemann:
InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. 194-209 - Deepak Garg, Frank Pfenning:
Stateful Authorization Logic: - Proof Theory and a Case Study. 210-225 - Flavio D. Garcia, Bart Jacobs:
Privacy-Friendly Energy-Metering via Homomorphic Encryption. 226-238 - Mete Akgün, Mehmet Ufuk Çaglayan:
Extending an RFID Security and Privacy Model by Considering Forward Untraceability. 239-254 - Michele Bezzi, Sabrina De Capitani di Vimercati
, Giovanni Livraga
, Pierangela Samarati
:
Protecting Privacy of Sensitive Value Distributions in Data Release. 255-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.