Table of contents

  1. Front Matter
  2. Policy Enforcement and Monitoring

    1. Peter Drábik, Fabio Martinelli, Charles Morisset
      Pages 1-16
    2. Yannis Mallios, Lujo Bauer, Dilsun Kaynar, Jay Ligatti
      Pages 17-32
    3. Giulio Caravagna, Gabriele Costa, Giovanni Pardini
      Pages 33-48
  3. Access Control

    1. Valerio Genovese, Deepak Garg, Daniele Rispoli
      Pages 65-80
    2. Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis
      Pages 81-96
    3. Simone Frau, Mohammad Torabi Dashti
      Pages 97-112
  4. Trust, Reputation, and Privacy

    1. Francisco Moyano, Carmen Fernandez-Gago, Javier Lopez
      Pages 113-128
    2. Jean-Guillaume Dumas, Hicham Hossayni
      Pages 129-144
    3. Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 145-160
  5. Distributed Systems and Physical Security

    1. Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia
      Pages 161-176
    2. Moti Geva, Amir Herzberg
      Pages 177-192
    3. Catherine Meadows, Dusko Pavlovic
      Pages 193-208
  6. Authentication

    1. Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia
      Pages 225-240
    2. Joep de Groot, Vinh Bui, Jean-Paul Linnartz, Johan Lukkien, Richard Verhoeven
      Pages 241-256
    3. Robert Künnemann, Graham Steel
      Pages 257-272
  7. Security Policies

    1. Silvio Ranise, Anh Truong, Alessandro Armando
      Pages 273-288
    2. Carlo Blundo, Stelvio Cimato
      Pages 289-304

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012).

The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.

Keywords

ARBAC policies RFID security distributed access control runtime monitors trust and reputation

Editors and affiliations

  • Audun Jøsang
    • 1
  • Pierangela Samarati
    • 2
  • Marinella Petrocchi
    • 3
  1. 1.Department of InformaticsUniversity of OsloBlindernNorway
  2. 2.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly
  3. 3.National Research Center(CNR)Institute of Informatics and Telematics(IIT)PisaItaly

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-38004-4
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-38003-7
  • Online ISBN 978-3-642-38004-4
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book