Security and Trust Management

8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

Editors:

ISBN: 978-3-642-38003-7 (Print) 978-3-642-38004-4 (Online)

Table of contents (20 chapters)

  1. Front Matter

    Pages -

  2. Policy Enforcement and Monitoring

    1. No Access

      Book Chapter

      Pages 1-16

      Cost-Aware Runtime Enforcement of Security Policies

    2. No Access

      Book Chapter

      Pages 17-32

      Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors

    3. No Access

      Book Chapter

      Pages 33-48

      Lazy Security Controllers

  3. Access Control

    1. No Access

      Book Chapter

      Pages 49-64

      Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities

    2. No Access

      Book Chapter

      Pages 65-80

      Labeled Goal-Directed Search in Access Control Logic

    3. No Access

      Book Chapter

      Pages 81-96

      A Use-Based Approach for Enhancing UCON

    4. No Access

      Book Chapter

      Pages 97-112

      Analysis of Communicating Authorization Policies

  4. Trust, Reputation, and Privacy

    1. No Access

      Book Chapter

      Pages 113-128

      Building Trust and Reputation In: A Development Framework for Trust Models Implementation

    2. No Access

      Book Chapter

      Pages 129-144

      Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures

    3. No Access

      Book Chapter

      Pages 145-160

      Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy

  5. Distributed Systems and Physical Security

    1. No Access

      Book Chapter

      Pages 161-176

      Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification

    2. No Access

      Book Chapter

      Pages 177-192

      DOT-COM: Decentralized Online Trading and COMmerce

    3. No Access

      Book Chapter

      Pages 193-208

      Formalizing Physical Security Procedures

  6. Authentication

    1. No Access

      Book Chapter

      Pages 209-224

      A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items

    2. No Access

      Book Chapter

      Pages 225-240

      Authenticating Email Search Results

    3. No Access

      Book Chapter

      Pages 241-256

      Software Authentication to Enhance Trust in Body Sensor Networks

    4. No Access

      Book Chapter

      Pages 257-272

      YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM

  7. Security Policies

    1. No Access

      Book Chapter

      Pages 273-288

      Boosting Model Checking to Analyse Large ARBAC Policies

    2. No Access

      Book Chapter

      Pages 289-304

      Constrained Role Mining

    3. No Access

      Book Chapter

      Pages 305-320

      A Datalog Semantics for Paralocks

  8. Back Matter

    Pages -