Security and Trust Management 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings / [electronic resource] :
edited by Sjouke Mauw, Christian Damsgaard Jensen.
- Cham : Springer International Publishing, 2014.
- 1 online resource (X, 210 p. 36 ill.)
- Lecture Notes in Computer Science, 8743 0302-9743 ; .
Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation -- Privacy Architectures: Reasoning About Data Minimisation and Integrity -- Monotonicity and Completeness in Attribute-based Access Control -- Caching and Auditing in the RPPM Model -- BlueWallet: The Secure Bitcoin Wallet -- Ensuring Secure Non-interference of Programs by Game Semantics -- Stateful Usage Control for Android Mobile Devices -- A Formal Model for Soft Enforcement -- Using Prediction Markets to Hedge Information Security Risks -- ALPS: An Action Language for Policy Specification and Automated Safety Analysis -- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA -- Hybrid Enforcement of Category-Based Access Control -- Lime: Data Lineage in the Malicious Environment -- NoPhish - An Anti-Phishing Education App -- ROMEO: Reputation Model Enhancing OpenID Simulator -- Evaluation of key management schemes in wireless sensor networks -- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.
9783319118512
Computer science. Computer security. Data encryption (Computer science). Management information systems. E-commerce.