Security and Trust Management

13th International Workshop, STM 2017, Oslo, Norway, September 14–15, 2017, Proceedings

  • Giovanni Livraga
  • Chris Mitchell
Conference proceedings STM 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10547)

Also part of the Security and Cryptology book sub series (LNSC, volume 10547)

Table of contents

  1. Front Matter
    Pages I-X
  2. Cryptosystems and Applied Cryptography

    1. Front Matter
      Pages 1-1
    2. Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka
      Pages 3-18
    3. Daniel Homann, Christian Göge, Lena Wiese
      Pages 19-35
    4. Papa B. Seye, Augustin P. Sarr
      Pages 36-52
  3. Software Security and Risk Management

    1. Front Matter
      Pages 53-53
    2. Job Noorman, Jan Tobias Mühlberg, Frank Piessens
      Pages 55-71
    3. Per Håkon Meland, Inger Anne Tøndel, Marie Moe, Fredrik Seehusen
      Pages 89-100
  4. Authorization

    1. Front Matter
      Pages 101-101
    2. Hiroaki Kikuchi, Niihara Koichi, Michihiro Yamada
      Pages 103-117
    3. Giacomo Giorgi, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino
      Pages 118-133
    4. Audun Jøsang
      Pages 134-144
  5. Security Vulnerabilities and Protocols

    1. Front Matter
      Pages 145-145
    2. Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne et al.
      Pages 147-163
    3. Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua, Tim A. C. Willemse
      Pages 164-179
    4. László Erdődi, Audun Jøsang
      Pages 180-190
  6. Secure Systems

    1. Front Matter
      Pages 191-191
    2. Daniele Canavese, Leonardo Regano, Cataldo Basile, Alessio Viticchié
      Pages 193-202
    3. Kalonji Kalala, Tao Feng, Iluju Kiringa
      Pages 203-212

About these proceedings

Introduction

This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were carefully reviewed and selected from 33 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; software security and risk management; authorization; security vulnerabilities and protocols; and secure systems.

Keywords

security trust security and trust management access control anonymity and pseudonimity data protection applied cryptography secure cloud data security internet authentication wireless communication systems cryptography telecommunication networks wireless sensor networks computer networks software engineering user interfaces ubiquitous computing data privacy

Editors and affiliations

  1. 1.Università degli Studi di MilanoCremaItaly
  2. 2.University of LondonEghamUnited Kingdom

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-68063-7
  • Copyright Information Springer International Publishing AG 2017
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-68062-0
  • Online ISBN 978-3-319-68063-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book