Skip to main content
  • Conference proceedings
  • © 2013

Security and Trust Management

8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7783)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): STM: International Workshop on Security and Trust Management

Conference proceedings info: STM 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Policy Enforcement and Monitoring

    1. Cost-Aware Runtime Enforcement of Security Policies

      • Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 1-16
    2. Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors

      • Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Jay Ligatti
      Pages 17-32
    3. Lazy Security Controllers

      • Giulio Caravagna, Gabriele Costa, Giovanni Pardini
      Pages 33-48
  3. Access Control

    1. Labeled Goal-Directed Search in Access Control Logic

      • Valerio Genovese, Deepak Garg, Daniele Rispoli
      Pages 65-80
    2. A Use-Based Approach for Enhancing UCON

      • Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis
      Pages 81-96
    3. Analysis of Communicating Authorization Policies

      • Simone Frau, Mohammad Torabi Dashti
      Pages 97-112
  4. Trust, Reputation, and Privacy

    1. Building Trust and Reputation In: A Development Framework for Trust Models Implementation

      • Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez
      Pages 113-128
    2. Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures

      • Jean-Guillaume Dumas, Hicham Hossayni
      Pages 129-144
    3. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy

      • Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 145-160
  5. Distributed Systems and Physical Security

    1. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification

      • Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia
      Pages 161-176
    2. DOT-COM: Decentralized Online Trading and COMmerce

      • Moti Geva, Amir Herzberg
      Pages 177-192
    3. Formalizing Physical Security Procedures

      • Catherine Meadows, Dusko Pavlovic
      Pages 193-208
  6. Authentication

    1. Authenticating Email Search Results

      • Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia
      Pages 225-240
    2. Software Authentication to Enhance Trust in Body Sensor Networks

      • Joep de Groot, Vinh Bui, Jean-Paul Linnartz, Johan Lukkien, Richard Verhoeven
      Pages 241-256
    3. YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM

      • Robert Künnemann, Graham Steel
      Pages 257-272
  7. Security Policies

    1. Boosting Model Checking to Analyse Large ARBAC Policies

      • Silvio Ranise, Anh Truong, Alessandro Armando
      Pages 273-288
    2. Constrained Role Mining

      • Carlo Blundo, Stelvio Cimato
      Pages 289-304

Other Volumes

  1. Security and Trust Management

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Editors and Affiliations

  • Department of Informatics, University of Oslo, Blindern, Norway

    Audun Jøsang

  • Dipartimento di Informatica, Università degli Studi di Milano, Crema, Italy

    Pierangela Samarati

  • National Research Center(CNR), Institute of Informatics and Telematics(IIT), Pisa, Italy

    Marinella Petrocchi

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access