Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings / [electronic resource] : edited by Sjouke Mauw, Christian Damsgaard Jensen. - Cham : Springer International Publishing, 2014. - 1 online resource (X, 210 p. 36 ill.) - Lecture Notes in Computer Science, 8743 0302-9743 ; .

Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.

9783319118512


Computer science.
Computer security.
Data encryption (Computer science).
Management information systems.
E-commerce.