Security and Trust Management

7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers

  • Catherine Meadows
  • Carmen Fernandez-Gago
Conference proceedings STM 2011

DOI: 10.1007/978-3-642-29963-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7170)

Table of contents (16 papers)

  1. Front Matter
  2. Trust Extortion on the Internet
    Audun Jøsang
    Pages 6-21
  3. Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security
    Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pam Briggs, Lewis Robart et al.
    Pages 28-39
  4. A Proof-Carrying File System with Revocable and Use-Once Certificates
    Jamie Morgenstern, Deepak Garg, Frank Pfenning
    Pages 40-55
  5. Hiding the Policy in Cryptographic Access Control
    Sascha Müller, Stefan Katzenbeisser
    Pages 90-105
  6. Location Privacy in Relation to Trusted Peers
    Klaus Rechert, Benjamin Greschbach
    Pages 106-121
  7. Fairness in Non-Repudiation Protocols
    Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen
    Pages 122-139
  8. Risk-Aware Role-Based Access Control
    Liang Chen, Jason Crampton
    Pages 140-156
  9. Automated Analysis of Infinite State Workflows with Access Control Policies
    Alessandro Armando, Silvio Ranise
    Pages 157-174
  10. Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
    Ulrich Greveler, Benjamin Justus, Dennis Löhr
    Pages 193-206
  11. Secure Architecure for the Integration of RFID and Sensors in Personal Networks
    Pablo Najera, Rodrigo Roman, Javier Lopez
    Pages 207-222
  12. Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources
    Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith
    Pages 223-238
  13. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.


RFID security cancelable biometrics personal network security protocols verification

Editors and affiliations

  • Catherine Meadows
    • 1
  • Carmen Fernandez-Gago
    • 2
  1. 1.Naval Research LaboratoryWashingtonUSA
  2. 2.Department of Computer ScienceUniversity of MalagaMálagaSpain

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29962-9
  • Online ISBN 978-3-642-29963-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349