Security and Trust Management

8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

  • Audun Jøsang
  • Pierangela Samarati
  • Marinella Petrocchi
Conference proceedings STM 2012

DOI: 10.1007/978-3-642-38004-4

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7783)

Table of contents (20 papers)

  1. Front Matter
  2. Policy Enforcement and Monitoring

    1. Cost-Aware Runtime Enforcement of Security Policies
      Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 1-16
    2. Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors
      Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Jay Ligatti
      Pages 17-32
    3. Lazy Security Controllers
      Giulio Caravagna, Gabriele Costa, Giovanni Pardini
      Pages 33-48
  3. Access Control

    1. Labeled Goal-Directed Search in Access Control Logic
      Valerio Genovese, Deepak Garg, Daniele Rispoli
      Pages 65-80
    2. A Use-Based Approach for Enhancing UCON
      Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis
      Pages 81-96
    3. Analysis of Communicating Authorization Policies
      Simone Frau, Mohammad Torabi Dashti
      Pages 97-112
  4. Trust, Reputation, and Privacy

    1. Building Trust and Reputation In: A Development Framework for Trust Models Implementation
      Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez
      Pages 113-128
    2. Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures
      Jean-Guillaume Dumas, Hicham Hossayni
      Pages 129-144
    3. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
      Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 145-160
  5. Distributed Systems and Physical Security

    1. Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification
      Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia
      Pages 161-176
    2. DOT-COM: Decentralized Online Trading and COMmerce
      Moti Geva, Amir Herzberg
      Pages 177-192
    3. Formalizing Physical Security Procedures
      Catherine Meadows, Dusko Pavlovic
      Pages 193-208
  6. Authentication

    1. Authenticating Email Search Results
      Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia
      Pages 225-240
    2. Software Authentication to Enhance Trust in Body Sensor Networks
      Joep de Groot, Vinh Bui, Jean-Paul Linnartz, Johan Lukkien, Richard Verhoeven
      Pages 241-256
    3. YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM
      Robert Künnemann, Graham Steel
      Pages 257-272
  7. Security Policies

    1. Boosting Model Checking to Analyse Large ARBAC Policies
      Silvio Ranise, Anh Truong, Alessandro Armando
      Pages 273-288
    2. Constrained Role Mining
      Carlo Blundo, Stelvio Cimato
      Pages 289-304

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012).

The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Keywords

ARBAC policies RFID security distributed access control runtime monitors trust and reputation

Editors and affiliations

  • Audun Jøsang
    • 1
  • Pierangela Samarati
    • 2
  • Marinella Petrocchi
    • 3
  1. 1.Department of InformaticsUniversity of OsloBlindernNorway
  2. 2.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly
  3. 3.National Research Center(CNR)Institute of Informatics and Telematics(IIT)PisaItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38003-7
  • Online ISBN 978-3-642-38004-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349