


default search action
STM 2012: Pisa, Italy
- Audun Jøsang, Pierangela Samarati, Marinella Petrocchi:
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7783, Springer 2013, ISBN 978-3-642-38003-7
Policy Enforcement and Monitoring
- Peter Drábik, Fabio Martinelli, Charles Morisset:
Cost-Aware Runtime Enforcement of Security Policies. 1-16 - Yannis Mallios, Lujo Bauer
, Dilsun Kirli Kaynar, Jay Ligatti:
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors. 17-32 - Giulio Caravagna
, Gabriele Costa
, Giovanni Pardini
:
Lazy Security Controllers. 33-48
Access Control
- Michele Barletta, Silvio Ranise
, Luca Viganò:
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities. 49-64 - Valerio Genovese, Deepak Garg, Daniele Rispoli:
Labeled Goal-Directed Search in Access Control Logic. 65-80 - Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis:
A Use-Based Approach for Enhancing UCON. 81-96 - Simone Frau, Mohammad Torabi Dashti
:
Analysis of Communicating Authorization Policies. 97-112
Trust, Reputation, and Privacy
- Francisco Moyano
, M. Carmen Fernández Gago, Javier López
:
Building Trust and Reputation In: A Development Framework for Trust Models Implementation. 113-128 - Jean-Guillaume Dumas
, Hicham Hossayni:
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures. 129-144 - Meilof Veeningen, Benne de Weger, Nicola Zannone
:
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. 145-160
Distributed Systems and Physical Security
- Nelson Nazzicari, Javier Almillategui, Angelos Stavrou
, Sushil Jajodia
:
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. 161-176 - Moti Geva, Amir Herzberg
:
DOT-COM: Decentralized Online Trading and COMmerce. 177-192 - Catherine Meadows, Dusko Pavlovic
:
Formalizing Physical Security Procedures. 193-208
Authentication
- Sjouke Mauw
, Selwyn Piramuthu:
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. 209-224 - Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia:
Authenticating Email Search Results. 225-240 - Joep A. de Groot, Vinh T. Bui, Jean-Paul M. G. Linnartz
, Johan Lukkien, Richard Verhoeven:
Software Authentication to Enhance Trust in Body Sensor Networks. 241-256 - Robert Künnemann, Graham Steel:
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. 257-272
Security Policies
- Silvio Ranise
, Anh Tuan Truong, Alessandro Armando
:
Boosting Model Checking to Analyse Large ARBAC Policies. 273-288 - Carlo Blundo
, Stelvio Cimato
:
Constrained Role Mining. 289-304 - Bart van Delft, Niklas Broberg, David Sands:
A Datalog Semantics for Paralocks. 305-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.