


default search action
STM 2015: Vienna, Austria
- Sara Foresti:

Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Lecture Notes in Computer Science 9331, Springer 2015, ISBN 978-3-319-24857-8
Security Metrics and Classification
- Mina Sheikhalishahi, Andrea Saracino

, Mohamed Mejri, Nadia Tawbi
, Fabio Martinelli:
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. 3-19 - Anna Lavygina, Alessandra Russo

, Naranker Dulay:
Integrating Privacy and Safety Criteria into Planning Tasks. 20-36 - Teemu Kanstrén, Antti Evesti:

Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments. 37-51
Data Protection
- Riccardo De Masellis

, Chiara Ghidini
, Silvio Ranise
:
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies. 55-71 - Erisa Karafili, Hanne Riis Nielson

, Flemming Nielson
:
How to Trust the Re-use of Data. 72-88 - Christian Zimmermann, Claus-Georg Nolte:

Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business. 89-104
Intrusion Detection and Software Vulnerabilities
- Andrea Pugliese

, Antonino Rullo
, Antonio Piccolo:
The AC-Index: Fast Online Detection of Correlated Alerts. 107-122 - Amr S. Abed

, Charles Clancy, David S. Levy:
Intrusion Detection System for Applications Using Linux Containers. 123-135 - John Galea, Mark Vella:

SUDUTA: Script UAF Detection Using Taint Analysis. 136-151
Cryptographic Protocols
- Christopher Mann, Daniel Loebenberger

:
Two-Factor Authentication for the Bitcoin Protocol. 155-171 - Constantinos Patsakis

, Panayiotis Kotzanikolaou
, Mélanie Bouroche
:
Private Proximity Testing on Steroids: An NTRU-based Protocol. 172-184 - Milan Broz

, Vashek Matyás:
Selecting a New Key Derivation Function for Disk Encryption. 185-199
Controlling Data Release
- Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo

:
It's My Privilege: Controlling Downgrading in DC-Labels. 203-219 - Jason Crampton, Conrad Williams:

Obligations in PTaCL. 220-235 - Kazuto Ogawa, Goichiro Hanaoka

, Hideki Imai:
Content and Key Management to Trace Traitors in Broadcasting Services. 236-252
Security Analysis, Risk Management, and Usability
- Ana Ferreira

, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. 255-264 - Melanie Volkamer, Karen Renaud

, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. 265-273 - Tatyana Ryutov, Michael D. Orosz, James Blythe, Detlof von Winterfeldt:

A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. 274-282 - Pankaj Pandey, Steven De Haes:

Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks. 283-292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














