Skip to main content
  • Conference proceedings
  • © 2014

Security and Trust Management

10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8743)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): STM: International Workshop on Security and Trust Management

Conference proceedings info: STM 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 papers)

  1. Front Matter

  2. Privacy Architectures: Reasoning about Data Minimisation and Integrity

    • Thibaud Antignac, Daniel Le Métayer
    Pages 17-32
  3. Monotonicity and Completeness in Attribute-Based Access Control

    • Jason Crampton, Charles Morisset
    Pages 33-48
  4. Caching and Auditing in the RPPM Model

    • Jason Crampton, James Sellwood
    Pages 49-64
  5. BlueWallet: The Secure Bitcoin Wallet

    • Tobias Bamert, Christian Decker, Roger Wattenhofer, Samuel Welten
    Pages 65-80
  6. Stateful Usage Control for Android Mobile Devices

    • Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino
    Pages 97-112
  7. A Formal Model for Soft Enforcement: Influencing the Decision-Maker

    • Charles Morisset, Iryna Yevseyeva, Thomas Groß, Aad van Moorsel
    Pages 113-128
  8. Using Prediction Markets to Hedge Information Security Risks

    • Pankaj Pandey, Einar Arthur Snekkenes
    Pages 129-145
  9. A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA

    • Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer
    Pages 162-177
  10. Short Papers

    1. Hybrid Enforcement of Category-Based Access Control

      • Asad Ali, Maribel Fernández
      Pages 178-182
    2. Lime: Data Lineage in the Malicious Environment

      • Michael Backes, Niklas Grimm, Aniket Kate
      Pages 183-187
    3. NoPhish: An Anti-Phishing Education App

      • Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza
      Pages 188-192
    4. ROMEO: ReputatiOn Model Enhancing OpenID Simulator

      • Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez
      Pages 193-197
    5. Evaluation of Key Management Schemes in Wireless Sensor Networks

      • Filip Jurnečka, Martin Stehlík, Vashek Matyáš
      Pages 198-203
  11. Back Matter

Other Volumes

  1. Security and Trust Management

About this book

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Editors and Affiliations

  • University of Luxembourg, Luxembourg, Luxembourg

    Sjouke Mauw

  • Department of Informatics and Mathematical Modelling, Technical University of Denmark, Lyngby, Denmark

    Christian Damsgaard Jensen

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access