default search action
STM 2011: Copenhagen, Denmark
- Catherine Meadows, M. Carmen Fernández Gago:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 - Bjørnar Solhaug, Ketil Stølen:
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. 1-5 - Audun Jøsang:
Trust Extortion on the Internet. 6-21 - Carsten Rudolph:
Trust Areas: A Security Paradigm for the Future Internet. 22-27 - Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. 28-39 - Jamie Morgenstern, Deepak Garg, Frank Pfenning:
A Proof-Carrying File System with Revocable and Use-Once Certificates. 40-55 - Valerio Genovese, Deepak Garg:
New Modalities for Access Control Logics: Permission, Control and Ratification. 56-71 - Neyire Deniz Sarier:
Security Notions of Biometric Remote Authentication Revisited. 72-89 - Sascha Müller, Stefan Katzenbeisser:
Hiding the Policy in Cryptographic Access Control. 90-105 - Klaus Rechert, Benjamin Greschbach:
Location Privacy in Relation to Trusted Peers. 106-121 - Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen:
Fairness in Non-Repudiation Protocols. 122-139 - Liang Chen, Jason Crampton:
Risk-Aware Role-Based Access Control. 140-156 - Alessandro Armando, Silvio Ranise:
Automated Analysis of Infinite State Workflows with Access Control Policies. 157-174 - Henrich Christopher Pöhls, Focke Höhne:
The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. 175-192 - Ulrich Greveler, Benjamin Justus, Dennis Löhr:
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms. 193-206 - Pablo Najera, Rodrigo Roman, Javier López:
Secure Architecure for the Integration of RFID and Sensors in Personal Networks. 207-222 - Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith:
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. 223-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.