Security and trust management: 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Lecture notes in computer science
7170 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | X, 238 S. graph. Darst. |
ISBN: | 3642299628 9783642299629 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040132217 | ||
003 | DE-604 | ||
005 | 20120613 | ||
007 | t| | ||
008 | 120514s2012 gw d||| |||| 10||| eng d | ||
015 | |a 12,N15 |2 dnb | ||
016 | 7 | |a 1021362603 |2 DE-101 | |
020 | |a 3642299628 |9 3-642-29962-8 | ||
020 | |a 9783642299629 |c Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.) |9 978-3-642-29962-9 | ||
024 | 3 | |a 9783642299629 | |
028 | 5 | 2 | |a Best.-Nr.: 86096972 |
035 | |a (OCoLC)796222006 | ||
035 | |a (DE-599)DNB1021362603 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-706 |a DE-83 |a DE-11 |a DE-91G | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
245 | 1 | 0 | |a Security and trust management |b 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers |c Catherine Meadows ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a X, 238 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7170 | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Kopenhagen |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Meadows, Catherine |e Sonstige |4 oth | |
711 | 2 | |a STM |n 7 |d 2011 |c Kopenhagen |j Sonstige |0 (DE-588)1022326074 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-29963-6 |
830 | 0 | |a Lecture notes in computer science |v 7170 |w (DE-604)BV000000607 |9 7170 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024989350 |
Datensatz im Suchindex
_version_ | 1820875383916986368 |
---|---|
adam_text |
IMAGE 1
TABLE O F CONTENTS
UNCERTAINTY, SUBJECTIVITY, TRUST AND RISK: HOW I T ALL FITS TOGETHER 1
BJ0RNAR SOLHAUG AND KETIL ST0LEN
TRUST EXTORTION ON THE INTERNET 6
AUDUN J0SANG
TRUST AREAS: A SECURITY PARADIGM FOR THE FUTURE INTERNET 22
CARSTEN RUDOLPH
NON-STANDARDS FOR TRUST: FOREGROUND TRUST AND SECOND THOUGHTS FOR MOBILE
SECURITY 28
STEPHEN MARSH, SYLVIE NOEL, T I M STORER, YAO WANG, P A M BRIGGS, LEWIS
ROBART, JOHN STEWART, BABAK ESFANDIARI, KHALIL EL-KHATIB, MEHMET VEFA
BICAKCI, MANH CUONG DAO, MICHAEL COHEN, AND DANIEL DA SILVA
A PROOF-CARRYING FILE SYSTEM WITH REVOCABLE AND USE-ONCE CERTIFICATES 40
JAMIE MORGENSTERN, DEEPAK GARG, AND FRANK PFENNING
NEW MODALITIES FOR ACCESS CONTROL LOGICS: PERMISSION, CONTROL AND
RATIFICATION 56
VALERIO GENOVESE AND DEEPAK GARG
SECURITY NOTIONS OF BIOMETRIC REMOTE AUTHENTICATION REVISITED 72
NEYIRE DENIZ SARIER
HIDING THE POLICY IN CRYPTOGRAPHIC ACCESS CONTROL 90
SASCHA MIILLER AND STEFAN KATZENBEISSER
LOCATION PRIVACY IN RELATION T O TRUSTED PEERS 106
KLAUS RECHERT AND BENJAMIN GRESCHBACH
FAIRNESS IN NON-REPUDIATION PROTOCOLS 122
WOJCIECH JAMROGA, SJOUKE MAUW, AND MATTHIJS MELISSEN
RISK-AWARE ROLE-BASED ACCESS CONTROL 140
LIANG CHEN AND JASON CRAMPTON
AUTOMATED ANALYSIS OF INFINITE STATE WORKFLOWS WITH ACCESS CONTROL
POLICIES 157
ALESSANDRO ARMANDO AND SILVIO RANISE
HTTP://D-NB.INFO/1021362603
IMAGE 2
X TABLE OF CONTENTS
T H E ROLE OF D A T A INTEGRITY IN E U DIGITAL SIGNATURE LEGISLATION -
ACHIEVING STATUTORY TRUST FOR SANITIZABLE SIGNATURE SCHEMES 175
HEN-RICH C. POHLS AND FOCKE HOHNE
MUTUAL REMOTE ATTESTATION: ENABLING SYSTEM CLONING FOR T P M BASED
PLATFORMS 193
ULRICH GREVELER, BENJAMIN JUSTUS, AND DENNIS LOEHR
SECURE ARCHITECURE FOR THE INTEGRATION OF RFID AND SENSORS IN PERSONAL
NETWORKS 207
PABLO NAJERA, RODRIGO ROMAN, AND JAVIER LOPEZ
ACCEPTING INFORMATION WITH A PINCH OF SALT: HANDLING UNTRUSTED
INFORMATION SOURCES 223
SYED SADIQUR RAHMAN, SADIE CREESE, AND MICHAEL GOLDSMITH
A U T H O R I N D E X 239 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV040132217 |
classification_rvk | SS 4800 |
ctrlnum | (OCoLC)796222006 (DE-599)DNB1021362603 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040132217</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120613</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">120514s2012 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">12,N15</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1021362603</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642299628</subfield><subfield code="9">3-642-29962-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642299629</subfield><subfield code="c">Pb. : ca. EUR 49.22 (DE) (freier Pr.), ca. EUR 50.60 (AT) (freier Pr.), ca. sfr 61.50 (freier Pr.)</subfield><subfield code="9">978-3-642-29962-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642299629</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86096972</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796222006</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1021362603</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and trust management</subfield><subfield code="b">7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers</subfield><subfield code="c">Catherine Meadows ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 238 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7170</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Kopenhagen</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meadows, Catherine</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">STM</subfield><subfield code="n">7</subfield><subfield code="d">2011</subfield><subfield code="c">Kopenhagen</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1022326074</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-29963-6</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7170</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7170</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024989350</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Kopenhagen gnd-content |
genre_facet | Konferenzschrift 2011 Kopenhagen |
id | DE-604.BV040132217 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:46Z |
institution | BVB |
institution_GND | (DE-588)1022326074 |
isbn | 3642299628 9783642299629 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024989350 |
oclc_num | 796222006 |
open_access_boolean | |
owner | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
owner_facet | DE-706 DE-83 DE-11 DE-91G DE-BY-TUM |
physical | X, 238 S. graph. Darst. |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers Catherine Meadows ... (eds.) Berlin [u.a.] Springer 2012 X, 238 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7170 Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Kopenhagen gnd-content Trusted Computing (DE-588)7562931-8 s Zugriffskontrolle (DE-588)4293034-0 s Privatsphäre (DE-588)4123980-5 s DE-604 Meadows, Catherine Sonstige oth STM 7 2011 Kopenhagen Sonstige (DE-588)1022326074 oth Erscheint auch als Online-Ausgabe 978-3-642-29963-6 Lecture notes in computer science 7170 (DE-604)BV000000607 7170 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers Lecture notes in computer science Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)7562931-8 (DE-588)1071861417 |
title | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers |
title_auth | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers |
title_exact_search | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers |
title_full | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers Catherine Meadows ... (eds.) |
title_fullStr | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers Catherine Meadows ... (eds.) |
title_full_unstemmed | Security and trust management 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers Catherine Meadows ... (eds.) |
title_short | Security and trust management |
title_sort | security and trust management 7th international workshop stm 2011 copenhagen denmark june 27 28 2011 revised selected papers |
title_sub | 7th international workshop, STM 2011, Copenhagen, Denmark, June 27 - 28, 2011 ; revised selected papers |
topic | Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Zugriffskontrolle Privatsphäre Trusted Computing Konferenzschrift 2011 Kopenhagen |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4004435&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024989350&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT meadowscatherine securityandtrustmanagement7thinternationalworkshopstm2011copenhagendenmarkjune27282011revisedselectedpapers AT stmkopenhagen securityandtrustmanagement7thinternationalworkshopstm2011copenhagendenmarkjune27282011revisedselectedpapers |