


default search action
STM 2010: Athens, Greece
- Jorge Cuéllar, Gilles Barthe

, Alexander Pretschner, Javier López:
Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6710, Springer 2011, ISBN 978-3-642-22443-0 - Jason Crampton, Charles Morisset:

An Auto-delegation Mechanism for Access Control Systems. 1-16 - Alessandro Armando

, Silvio Ranise
:
Automated Symbolic Analysis of ARBAC-Policies. 17-34 - Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin:

Influence of Attribute Freshness on Decision Making in Usage Control. 35-50 - Clara Bertolissi, Maribel Fernández:

Rewrite Specifications of Access Control Policies in Distributed Environments. 51-67 - Peter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson:

A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes. 68-83 - Ioanna Dionysiou

, K. Harald Gjermundrød
, David E. Bakken:
GUTS: A Framework for Adaptive and Configureable Grid User Trust Service. 84-99 - Simon N. Foley

, Wayne Mac Adams, Barry O'Sullivan
:
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System. 100-115 - Hidehito Gomi:

An Authentication Trust Metric for Federated Identity Management Systems. 116-131 - Yanjie Sun, Chenyi Zhang

, Jun Pang, Baptiste Alcalde, Sjouke Mauw
:
A Trust-Augmented Voting Scheme for Collaborative Privacy Management. 132-146 - Md. Abdul Based, Stig Fr. Mjølsnes

:
Universally Composable NIZK Protocol in an Internet Voting Scheme. 147-162 - Ralf Sasse

, Santiago Escobar
, Catherine Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. 163-178 - Nadim Sarrouh, Florian Eilers, Uwe Nestmann, Ina Schieferdecker

:
Defamation-Free Networks through User-Centered Data Control. 179-193 - Rafael Accorsi, Claus Wonnemann:

InDico: Information Flow Analysis of Business Processes for Confidentiality Requirements. 194-209 - Deepak Garg, Frank Pfenning:

Stateful Authorization Logic: - Proof Theory and a Case Study. 210-225 - Flavio D. Garcia, Bart Jacobs:

Privacy-Friendly Energy-Metering via Homomorphic Encryption. 226-238 - Mete Akgün, Mehmet Ufuk Çaglayan:

Extending an RFID Security and Privacy Model by Considering Forward Untraceability. 239-254 - Michele Bezzi, Sabrina De Capitani di Vimercati

, Giovanni Livraga
, Pierangela Samarati
:
Protecting Privacy of Sensitive Value Distributions in Data Release. 255-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














