Security and Trust Management

9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings

  • Rafael Accorsi
  • Silvio Ranise
Conference proceedings STM 2013

DOI: 10.1007/978-3-642-41098-7

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8203)

Table of contents (15 papers)

  1. Front Matter
  2. Privacy

    1. On Enhancement of ‘Share The Secret’ Scheme for Location Privacy
      Costas Delakouridis, Christos Anagnostopoulos
      Pages 1-16
    2. Maintaining Database Anonymity in the Presence of Queries
      Ryan Riley, Chris Clifton, Qutaibah Malluhi
      Pages 33-48
  3. Network, Web, and Mobile Security

    1. A Probabilistic Framework for Distributed Localization of Attackers in MANETs
      Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola
      Pages 49-64
    2. MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities
      Mauro Conti, Nicola Dragoni, Sebastiano Gottardo
      Pages 65-81
    3. Evaluating the Manageability of Web Browsers Controls
      Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis
      Pages 82-98
  4. Security Protocols

    1. Using Interpolation for the Verification of Security Protocols
      Marco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove
      Pages 99-114
    2. RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases
      Lil María Rodríguez-Henríquez, Debrup Chakraborty
      Pages 115-130
  5. Security Policies and Trust Management

    1. Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names
      Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas
      Pages 131-143
    2. Probabilistic Cost Enforcement of Security Policies
      Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Fabio Martinelli, Charles Morisset
      Pages 144-159
    3. Selective Disclosure in Datalog-Based Trust Management
      Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss
      Pages 160-175
  6. Business Process Security

    1. Towards a Detective Approach to Process-Centered Resilience
      Thomas Koslowski, Christian Zimmermann
      Pages 176-190
    2. IF-Net: A Meta-Model for Security-Oriented Process Specification
      Thomas Stocker, Frank Böhr
      Pages 191-206
  7. Watermarking for Security

    1. Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation
      Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Fréderic Cuppens, Christian Roux
      Pages 207-222
    2. Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain
      Marco Botta, Davide Cavagnino, Victor Pomponiu
      Pages 223-234
  8. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 9th International Workshop on Security and Trust Management, STM 2013, held in Egham, UK, in September 2013 - in conjunction with the 18th European Symposium Research in Computer Security (ESORICS 2013).
The 15 revised full papers including two invited talks were carefully reviewed and selected from 47 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Keywords

cryptanalysis formal methods fragile watermarking genetic algorithms information hiding

Editors and affiliations

  • Rafael Accorsi
    • 1
  • Silvio Ranise
    • 2
  1. 1.Department of TelematicsUniversity of FreiburgFreiburgGermany
  2. 2.Centre for Information TechnologyFondazione Bruno Kessler ( FBK)TrentoItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-41097-0
  • Online ISBN 978-3-642-41098-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349