International Workshop on Security and Trust Management

Security and Trust Management

11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings

  • Sara Foresti
Conference proceedings

DOI: 10.1007/978-3-319-24858-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9331)

Table of contents (19 papers)

  1. Front Matter
    Pages I-X
  2. Security Metrics and Classification

    1. Front Matter
      Pages 1-1
    2. Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns
      Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli
      Pages 3-19
    3. Integrating Privacy and Safety Criteria into Planning Tasks
      Anna Lavygina, Alessandra Russo, Naranker Dulay
      Pages 20-36
  3. Data Protection

    1. Front Matter
      Pages 53-53
    2. A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies
      Riccardo De Masellis, Chiara Ghidini, Silvio Ranise
      Pages 55-71
    3. How to Trust the Re-use of Data
      Erisa Karafili, Hanne Riis Nielson, Flemming Nielson
      Pages 72-88
  4. Intrusion Detection and Software Vulnerabilities

    1. Front Matter
      Pages 105-105
    2. The AC-Index: Fast Online Detection of Correlated Alerts
      Andrea Pugliese, Antonino Rullo, Antonio Piccolo
      Pages 107-122
    3. Intrusion Detection System for Applications Using Linux Containers
      Amr S. Abed, Charles Clancy, David S. Levy
      Pages 123-135
    4. SUDUTA: Script UAF Detection Using Taint Analysis
      John Galea, Mark Vella
      Pages 136-151
  5. Cryptographic Protocols

    1. Front Matter
      Pages 153-153
    2. Two-Factor Authentication for the Bitcoin Protocol
      Christopher Mann, Daniel Loebenberger
      Pages 155-171
    3. Private Proximity Testing on Steroids: An NTRU-based Protocol
      Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche
      Pages 172-184
    4. Selecting a New Key Derivation Function for Disk Encryption
      Milan Brož, Vashek Matyáš
      Pages 185-199
  6. Controlling Data Release

    1. Front Matter
      Pages 201-201
    2. It’s My Privilege: Controlling Downgrading in DC-Labels
      Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo
      Pages 203-219
    3. Obligations in PTaCL
      Jason Crampton, Conrad Williams
      Pages 220-235

About these proceedings


This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.

The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.


Access Control Data Protection Networked Systems Security Privacy and Anoymity Security Metrics Applied Computing Authentication Cryptographic Protocols Disk Encryption Formal Methods for Security and Trust Identity Management Information Privacy Information Security Network Security Password Hashing Privacy Property Rights Risk Management Security Analysis Security and Trust Management

Editors and affiliations

  • Sara Foresti
    • 1
  1. 1.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-24857-8
  • Online ISBN 978-3-319-24858-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349