© 2015

Security and Trust Management

11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings

  • Sara Foresti
Conference proceedings STM 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9331)

Also part of the Security and Cryptology book sub series (LNSC, volume 9331)

Table of contents

  1. Front Matter
    Pages I-X
  2. Security Metrics and Classification

    1. Front Matter
      Pages 1-1
    2. Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli
      Pages 3-19
    3. Anna Lavygina, Alessandra Russo, Naranker Dulay
      Pages 20-36
  3. Data Protection

    1. Front Matter
      Pages 53-53
    2. Riccardo De Masellis, Chiara Ghidini, Silvio Ranise
      Pages 55-71
    3. Erisa Karafili, Hanne Riis Nielson, Flemming Nielson
      Pages 72-88
  4. Intrusion Detection and Software Vulnerabilities

    1. Front Matter
      Pages 105-105
    2. Andrea Pugliese, Antonino Rullo, Antonio Piccolo
      Pages 107-122
    3. Amr S. Abed, Charles Clancy, David S. Levy
      Pages 123-135
    4. John Galea, Mark Vella
      Pages 136-151
  5. Cryptographic Protocols

    1. Front Matter
      Pages 153-153
    2. Christopher Mann, Daniel Loebenberger
      Pages 155-171
    3. Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche
      Pages 172-184
    4. Milan Brož, Vashek Matyáš
      Pages 185-199
  6. Controlling Data Release

    1. Front Matter
      Pages 201-201
    2. Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo
      Pages 203-219
    3. Jason Crampton, Conrad Williams
      Pages 220-235

About these proceedings


This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.

The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.


Access Control Data Protection Networked Systems Security Privacy and Anoymity Security Metrics Applied Computing Authentication Cryptographic Protocols Disk Encryption Formal Methods for Security and Trust Identity Management Information Privacy Information Security Network Security Password Hashing Privacy Property Rights Risk Management Security Analysis Security and Trust Management

Editors and affiliations

  • Sara Foresti
    • 1
  1. 1.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly

Bibliographic information