Security and Trust Management

12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings

  • Gilles Barthe
  • Evangelos Markatos
  • Pierangela Samarati
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9871)

Table of contents

  1. Front Matter
    Pages I-X
  2. Christof Rath, Thomas Niedermair, Thomas Zefferer
    Pages 1-16
  3. Mohammed Shafiul Alam Khan, Chris J. Mitchell
    Pages 17-31
  4. Gianluca Barbon, Agostino Cortesi, Pietro Ferrara, Enrico Steffinlongo
    Pages 32-46
  5. Tarek Sayah, Emmanuel Coquery, Romuald Thion, Mohand-Saïd Hacid
    Pages 47-63
  6. Fabio Martinelli, Ilaria Matteucci, Paolo Mori, Andrea Saracino
    Pages 64-81
  7. Mathias Weber, Annette Bieniusa, Arnd Poetzsch-Heffter
    Pages 82-97
  8. Ruben Rios, Carmen Fernandez-Gago, Javier Lopez
    Pages 98-105
  9. Fabian van den Broek, Brinda Hampiholi, Bart Jacobs
    Pages 106-121
  10. Jordi Cucurull, Jordi Puiggalí
    Pages 122-137
  11. Ravi Jhawar, Karim Lounis, Sjouke Mauw
    Pages 138-153
  12. Wojciech Jamroga, Masoud Tabatabaei
    Pages 154-169
  13. Gabriele Lenzini, Sjouke Mauw, Samir Ouchani
    Pages 170-178
  14. Federico De Meo, Marco Rocchetto, Luca Viganò
    Pages 179-195
  15. Michael Rushanan, David Russell, Aviel D. Rubin
    Pages 196-211
  16. Andreas Follner, Alexandre Bartel, Hui Peng, Yu-Chen Chang, Kyriakos Ispoglou, Mathias Payer et al.
    Pages 212-228
  17. Back Matter
    Pages 229-229

About these proceedings

Introduction


This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.

The 13 full papers together with 2 short papers were carefully reviewed and selected from 34 submissions. the focus on the workshop was on following topics: access control, data protection, mobile security, privacy, security and trust policies, trust models.  

Keywords

access control applied computing authentication data protection Internet

Editors and affiliations

  • Gilles Barthe
    • 1
  • Evangelos Markatos
    • 2
  • Pierangela Samarati
    • 3
  1. 1.IMDEA Software Institute Pozuelo de AlarcónSpain
  2. 2.Dept Comp Sci, Vassilika VoutonUniv of Crete Dept Comp Sci, Vassilika VoutonHeraklion, CreteGreece
  3. 3.Dipto di InformaticaUniv degli Studi di Milano Dipto di InformaticaCremaItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-46598-2
  • Copyright Information Springer International Publishing AG 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-46597-5
  • Online ISBN 978-3-319-46598-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349