Security and Trust Management

9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

  • Rafael Accorsi
  • Silvio Ranise
Conference proceedings STM 2013

DOI: 10.1007/978-3-642-41098-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8203)

Table of contents

  1. Front Matter
  2. Privacy

    1. Costas Delakouridis, Christos Anagnostopoulos
      Pages 1-16
    2. Ryan Riley, Chris Clifton, Qutaibah Malluhi
      Pages 33-48
  3. Network, Web, and Mobile Security

    1. Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola
      Pages 49-64
    2. Mauro Conti, Nicola Dragoni, Sebastiano Gottardo
      Pages 65-81
    3. Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis
      Pages 82-98
  4. Security Protocols

    1. Marco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove
      Pages 99-114
    2. Lil María Rodríguez-Henríquez, Debrup Chakraborty
      Pages 115-130
  5. Security Policies and Trust Management

    1. Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas
      Pages 131-143
    2. Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Fabio Martinelli, Charles Morisset
      Pages 144-159
    3. Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss
      Pages 160-175
  6. Business Process Security

    1. Thomas Koslowski, Christian Zimmermann
      Pages 176-190
    2. Thomas Stocker, Frank Böhr
      Pages 191-206
  7. Watermarking for Security

    1. Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Fréderic Cuppens, Christian Roux
      Pages 207-222
    2. Marco Botta, Davide Cavagnino, Victor Pomponiu
      Pages 223-234
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013).
The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Keywords

cryptanalysis formal methods fragile watermarking genetic algorithms information hiding

Editors and affiliations

  • Rafael Accorsi
    • 1
  • Silvio Ranise
    • 2
  1. 1.Department of TelematicsUniversity of FreiburgFreiburgGermany
  2. 2.Centre for Information TechnologyFondazione Bruno Kessler ( FBK)TrentoItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-41097-0
  • Online ISBN 978-3-642-41098-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349