Skip to main content
main-content

Über dieses Buch

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 33 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2011 features submissions from academia, industry, and government presenting novel research on all theoretical and practical aspects of security and trust in information and communication technologies.

Inhaltsverzeichnis

Frontmatter

2012 | OriginalPaper | Buchkapitel

Uncertainty, Subjectivity, Trust and Risk: How It All Fits together

Bjørnar Solhaug, Ketil Stølen

2012 | OriginalPaper | Buchkapitel

Trust Extortion on the Internet

Audun Jøsang

2012 | OriginalPaper | Buchkapitel

Trust Areas: A Security Paradigm for the Future Internet

Carsten Rudolph

2012 | OriginalPaper | Buchkapitel

Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security

Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pam Briggs, Lewis Robart, John Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva

2012 | OriginalPaper | Buchkapitel

A Proof-Carrying File System with Revocable and Use-Once Certificates

Jamie Morgenstern, Deepak Garg, Frank Pfenning

2012 | OriginalPaper | Buchkapitel

New Modalities for Access Control Logics: Permission, Control and Ratification

Valerio Genovese, Deepak Garg

2012 | OriginalPaper | Buchkapitel

Security Notions of Biometric Remote Authentication Revisited

Neyire Deniz Sarier

2012 | OriginalPaper | Buchkapitel

Hiding the Policy in Cryptographic Access Control

Sascha Müller, Stefan Katzenbeisser

2012 | OriginalPaper | Buchkapitel

Location Privacy in Relation to Trusted Peers

Klaus Rechert, Benjamin Greschbach

2012 | OriginalPaper | Buchkapitel

Fairness in Non-Repudiation Protocols

Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen

2012 | OriginalPaper | Buchkapitel

Risk-Aware Role-Based Access Control

Liang Chen, Jason Crampton

2012 | OriginalPaper | Buchkapitel

Automated Analysis of Infinite State Workflows with Access Control Policies

Alessandro Armando, Silvio Ranise

2012 | OriginalPaper | Buchkapitel

The Role of Data Integrity in EU Digital Signature Legislation — Achieving Statutory Trust for Sanitizable Signature Schemes

Henrich C. Pöhls, Focke Höhne

2012 | OriginalPaper | Buchkapitel

Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms

Ulrich Greveler, Benjamin Justus, Dennis Löhr

2012 | OriginalPaper | Buchkapitel

Secure Architecure for the Integration of RFID and Sensors in Personal Networks

Pablo Najera, Rodrigo Roman, Javier Lopez

2012 | OriginalPaper | Buchkapitel

Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources

Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith

Backmatter

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.

Whitepaper

- ANZEIGE -

Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!

Bildnachweise