Skip to main content
  • Conference proceedings
  • © 2015

Security and Trust Management

11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9331)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): STM: International Workshop on Security and Trust Management

Conference proceedings info: STM 2015.

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-24858-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 59.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (19 papers)

  1. Front Matter

    Pages I-X
  2. Security Metrics and Classification

    1. Front Matter

      Pages 1-1
    2. Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns

      • Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli
      Pages 3-19
    3. Integrating Privacy and Safety Criteria into Planning Tasks

      • Anna Lavygina, Alessandra Russo, Naranker Dulay
      Pages 20-36
  3. Data Protection

    1. Front Matter

      Pages 53-53
    2. A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies

      • Riccardo De Masellis, Chiara Ghidini, Silvio Ranise
      Pages 55-71
    3. How to Trust the Re-use of Data

      • Erisa Karafili, Hanne Riis Nielson, Flemming Nielson
      Pages 72-88
  4. Intrusion Detection and Software Vulnerabilities

    1. Front Matter

      Pages 105-105
    2. The AC-Index: Fast Online Detection of Correlated Alerts

      • Andrea Pugliese, Antonino Rullo, Antonio Piccolo
      Pages 107-122
    3. Intrusion Detection System for Applications Using Linux Containers

      • Amr S. Abed, Charles Clancy, David S. Levy
      Pages 123-135
    4. SUDUTA: Script UAF Detection Using Taint Analysis

      • John Galea, Mark Vella
      Pages 136-151
  5. Cryptographic Protocols

    1. Front Matter

      Pages 153-153
    2. Two-Factor Authentication for the Bitcoin Protocol

      • Christopher Mann, Daniel Loebenberger
      Pages 155-171
    3. Private Proximity Testing on Steroids: An NTRU-based Protocol

      • Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche
      Pages 172-184
    4. Selecting a New Key Derivation Function for Disk Encryption

      • Milan Brož, Vashek Matyáš
      Pages 185-199
  6. Controlling Data Release

    1. Front Matter

      Pages 201-201
    2. It’s My Privilege: Controlling Downgrading in DC-Labels

      • Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo
      Pages 203-219
    3. Obligations in PTaCL

      • Jason Crampton, Conrad Williams
      Pages 220-235

Other Volumes

  1. Security and Trust Management

    11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings

About this book

This book constitutes the refereed proceedings of the 11th International Workshop on Security and Trust Management, STM 2015, held in Vienna, Austria, in September 2015, in conjunction with the 20th European Symposium Research in Computer Security, ESORICS 2015.

The 15 revised full papers were carefully reviewed and selected from 38 submissions. They are organized in topical sections as security metrics and classification; data protection; intrusion detection and software vulnerabilities; cryptographic protocols; controlling data release; and security analysis, risk management and usability.

Keywords

  • Access Control
  • Data Protection
  • Networked Systems Security
  • Privacy and Anoymity
  • Security Metrics
  • Applied Computing
  • Authentication
  • Cryptographic Protocols
  • Disk Encryption
  • Formal Methods for Security and Trust
  • Identity Management
  • Information Privacy
  • Information Security
  • Network Security
  • Password Hashing
  • Privacy
  • Property Rights
  • Risk Management
  • Security Analysis
  • Security and Trust Management

Editors and Affiliations

  • Dipartimento di Informatica, Università degli Studi di Milano, Crema, Italy

    Sara Foresti

Bibliographic Information

Buying options

eBook USD 44.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-24858-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 59.99
Price excludes VAT (USA)