Security and Trust Management

9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

Editors:

ISBN: 978-3-642-41097-0 (Print) 978-3-642-41098-7 (Online)

Table of contents (15 chapters)

  1. Front Matter

    Pages -

  2. Privacy

    1. No Access

      Book Chapter

      Pages 1-16

      On Enhancement of ‘Share The Secret’ Scheme for Location Privacy

    2. No Access

      Book Chapter

      Pages 17-32

      New Attacks against Transformation-Based Privacy-Preserving Linear Programming

    3. No Access

      Book Chapter

      Pages 33-48

      Maintaining Database Anonymity in the Presence of Queries

  3. Network, Web, and Mobile Security

    1. No Access

      Book Chapter

      Pages 49-64

      A Probabilistic Framework for Distributed Localization of Attackers in MANETs

    2. No Access

      Book Chapter

      Pages 65-81

      MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities

    3. No Access

      Book Chapter

      Pages 82-98

      Evaluating the Manageability of Web Browsers Controls

  4. Security Protocols

    1. No Access

      Book Chapter

      Pages 99-114

      Using Interpolation for the Verification of Security Protocols

    2. No Access

      Book Chapter

      Pages 115-130

      RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases

  5. Security Policies and Trust Management

    1. No Access

      Book Chapter

      Pages 131-143

      Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names

    2. No Access

      Book Chapter

      Pages 144-159

      Probabilistic Cost Enforcement of Security Policies

    3. No Access

      Book Chapter

      Pages 160-175

      Selective Disclosure in Datalog-Based Trust Management

  6. Business Process Security

    1. No Access

      Book Chapter

      Pages 176-190

      Towards a Detective Approach to Process-Centered Resilience

    2. No Access

      Book Chapter

      Pages 191-206

      IF-Net: A Meta-Model for Security-Oriented Process Specification

  7. Watermarking for Security

    1. No Access

      Book Chapter

      Pages 207-222

      Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation

    2. No Access

      Book Chapter

      Pages 223-234

      Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain

  8. Back Matter

    Pages -