Security and trust management: 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7783 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (X, 320 S.) graph. Darst. |
ISBN: | 9783642380037 9783642380044 |
DOI: | 10.1007/978-3-642-38004-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV041393887 | ||
003 | DE-604 | ||
005 | 20140213 | ||
006 | a |||| 10||| | ||
007 | cr|uuu---uuuuu | ||
008 | 131104s2013 |||| o||u| ||||||eng d | ||
020 | |a 9783642380037 |9 978-3-642-38003-7 | ||
020 | |a 9783642380044 |c eISBN |9 978-3-642-38004-4 | ||
024 | 7 | |a 10.1007/978-3-642-38004-4 |2 doi | |
035 | |a (OCoLC)846968556 | ||
035 | |a (DE-599)BVBBV041393887 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M347 |a DE-20 |a DE-703 |a DE-Aug4 |a DE-92 |a DE-29 |a DE-859 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.8 | |
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 050f |2 stub | ||
245 | 1 | 0 | |a Security and trust management |b 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers |c Audun Jøsang ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (X, 320 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7783 | |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Trusted Computing |0 (DE-588)7562931-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2012 |z Pisa |2 gnd-content | |
689 | 0 | 0 | |a Trusted Computing |0 (DE-588)7562931-8 |D s |
689 | 0 | 1 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Jøsang, Audun |e Sonstige |4 oth | |
711 | 2 | |a STM |n 8 |d 2012 |c Pisa |j Sonstige |0 (DE-588)1034196146 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7783 |w (DE-604)BV014880109 |9 7783 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-38004-4 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-2-LNC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-026841605 |
Datensatz im Suchindex
_version_ | 1804151495473496064 |
---|---|
adam_text | SECURITY AND TRUST MANAGEMENT
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
POLICY ENFORCEMENT AND MONITORING
COST-AWARE RUNTIME ENFORCEMENT OF SECURITY POLICIES
ENFORCING MORE WITH LESS: FORMALIZING TARGET-AWARE RUN-TIME MONITORS
LAZY SECURITY CONTROLLERS
ACCESS CONTROL
AUTOMATED ANALYSIS OF SCENARIO-BASED SPECIFICATIONS OF DISTRIBUTED
ACCESS CONTROL POLICIES WITH NON-MECHANIZABLE ACTIVITIES
LABELED GOAL-DIRECTED SEARCH IN ACCESS CONTROL LOGIC
A USE-BASED APPROACH FOR ENHANCING UCON
ANALYSIS OF COMMUNICATING AUTHORIZATION POLICIES
TRUST, REPUTATION, AND PRIVACY BUILDING TRUST AND REPUTATION IN: A
DEVELOPMENT FRAMEWORK FOR TRUST MODELS IMPLEMENTATION
MATRIX POWERS ALGORITHMS FOR TRUST EVALUATION IN PUBLIC-KEY
INFRASTRUCTURES
FORMAL MODELLING OF (DE)PSEUDONYMISATION: A CASE STUDY IN HEALTH CARE
PRIVACY
DISTRIBUTED SYSTEMS AND PHYSICAL SECURITY
SWITCHWALL: AUTOMATED TOPOLOGY FINGERPRINTING AND BEHAVIOR DEVIATION
IDENTIFICATION
DOT-COM: DECENTRALIZED ONLINE TRADING AND COMMERCE
FORMALIZING PHYSICAL SECURITY PROCEDURES
AUTHENTICATION
A PUF-BASED AUTHENTICATION PROTOCOL TO ADDRESS TICKET-SWITCHING OF
RFID-TAGGED ITEMS
AUTHENTICATING EMAIL SEARCH RESULTS
SOFTWARE AUTHENTICATION TO ENHANCE TRUST IN BODY SENSOR NETWORKS
YUBISECURE? FORMAL SECURITY ANALYSIS RESULTS FOR THE YUBIKEY AND YUBIHSM
SECURITY POLICIES
BOOSTING MODEL CHECKING TO ANALYSE LARGE ARBAC POLICIES
CONSTRAINED ROLE MINING
A DATALOG SEMANTICS FOR PARALOCKS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
SECURITY AND TRUST MANAGEMENT
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED POST-CONFERENCE
PROCEEDINGS OF THE 8TH INTERNATIONAL WORKSHOP ON SECURITY AND TRUST
MANAGEMENT, STM 2012, HELD IN PISA, ITALY, IN SEPTEMBER 2012 - IN
CONJUNCTION WITH THE 17TH EUROPEAN SYMPOSIUM RESEARCH IN COMPUTER
SECURITY (ESORICS 2012). THE 20 REVISED FULL PAPERS WERE CAREFULLY
REVIEWED AND SELECTED FROM 57 SUBMISSIONS. THE PAPERS ARE ORGANIZED INTO
TOPICAL SECTIONS ON POLICY ENFORCEMENT AND MONITORING; ACCESS CONTROL;
TRUST, REPUTATION, AND PRIVACY; DISTRIBUTED SYSTEMS AND PHYSICAL
SECURITY; AUTHENTICATION AND SECURITY POLICIES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV041393887 |
classification_tum | DAT 461f DAT 465f DAT 000 DAT 050f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)846968556 (DE-599)BVBBV041393887 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-38004-4 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02519nmm a2200529 cb4500</leader><controlfield tag="001">BV041393887</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20140213 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">131104s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642380037</subfield><subfield code="9">978-3-642-38003-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642380044</subfield><subfield code="c">eISBN</subfield><subfield code="9">978-3-642-38004-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-38004-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)846968556</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041393887</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and trust management</subfield><subfield code="b">8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers</subfield><subfield code="c">Audun Jøsang ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 320 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7783</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2012</subfield><subfield code="z">Pisa</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Trusted Computing</subfield><subfield code="0">(DE-588)7562931-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jøsang, Audun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">STM</subfield><subfield code="n">8</subfield><subfield code="d">2012</subfield><subfield code="c">Pisa</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1034196146</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7783</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7783</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-38004-4</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026841605</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2012 Pisa gnd-content |
genre_facet | Konferenzschrift 2012 Pisa |
id | DE-604.BV041393887 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:55:44Z |
institution | BVB |
institution_GND | (DE-588)1034196146 |
isbn | 9783642380037 9783642380044 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026841605 |
oclc_num | 846968556 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-M347 DE-20 DE-703 DE-Aug4 DE-92 DE-29 DE-859 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (X, 320 S.) graph. Darst. |
psigel | ZDB-2-SCS ZDB-2-LNC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers Audun Jøsang ... (eds.) Berlin [u.a.] Springer 2013 1 Online-Ressource (X, 320 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7783 Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Privatsphäre (DE-588)4123980-5 gnd rswk-swf Trusted Computing (DE-588)7562931-8 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2012 Pisa gnd-content Trusted Computing (DE-588)7562931-8 s Zugriffskontrolle (DE-588)4293034-0 s Privatsphäre (DE-588)4123980-5 s DE-604 Jøsang, Audun Sonstige oth STM 8 2012 Pisa Sonstige (DE-588)1034196146 oth Lecture notes in computer science 7783 (DE-604)BV014880109 7783 https://doi.org/10.1007/978-3-642-38004-4 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers Lecture notes in computer science Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
subject_GND | (DE-588)4293034-0 (DE-588)4123980-5 (DE-588)7562931-8 (DE-588)1071861417 |
title | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers |
title_auth | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers |
title_exact_search | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers |
title_full | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers Audun Jøsang ... (eds.) |
title_fullStr | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers Audun Jøsang ... (eds.) |
title_full_unstemmed | Security and trust management 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers Audun Jøsang ... (eds.) |
title_short | Security and trust management |
title_sort | security and trust management 8th international workshop stm 2012 pisa italy september 13 14 2012 revised selected papers |
title_sub | 8th international workshop, STM 2012, Pisa, Italy, September 13 - 14, 2012 ; revised selected papers |
topic | Zugriffskontrolle (DE-588)4293034-0 gnd Privatsphäre (DE-588)4123980-5 gnd Trusted Computing (DE-588)7562931-8 gnd |
topic_facet | Zugriffskontrolle Privatsphäre Trusted Computing Konferenzschrift 2012 Pisa |
url | https://doi.org/10.1007/978-3-642-38004-4 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026841605&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT jøsangaudun securityandtrustmanagement8thinternationalworkshopstm2012pisaitalyseptember13142012revisedselectedpapers AT stmpisa securityandtrustmanagement8thinternationalworkshopstm2012pisaitalyseptember13142012revisedselectedpapers |