This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Workshop on Security and Trust Management, STM 2011, held in Copenhagen, Denmark, in June 2011 - co-located with IFIPTM 2011, the 5th IFIP International Conference on Trust Management. The 12 revised f
[Lecture Notes in Computer Science] Security and Trust Management Volume 7783 || Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures
✍ Scribed by Jøsang, Audun; Samarati, Pierangela; Petrocchi, Marinella
- Book ID
- 121462152
- Publisher
- Springer Berlin Heidelberg
- Year
- 2013
- Tongue
- English
- Weight
- 289 KB
- Edition
- 2
- Category
- Article
- ISBN
- 3642380042
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 revised full papers were carefully reviewed and selected from 57 submissions. The papers are organized into topical sections on policy enforcement and monitoring; access control; trust, reputation, and privacy; distributed systems and physical security; authentication and security policies.
📜 SIMILAR VOLUMES
This Book Constitutes The Refereed Proceedings Of The 8th International Conference On Trust And Privacy In Digital Business, Trustbus 2012, Held In Vienna, Austria, In September 2012 In Conjunction With Dexa 2012. The 18 Revised Full Papers Presented Together With 12 Presentations Of Eu Projects Wer
This book constitutes the refereed proceedings of the 8th International Conference on Trust and Privacy in Digital Business, TrustBus 2011, held in Toulouse, France, in August/September 2011 in conjunction with DEXA 2011. The 18 revised full papers presented were carefully reviewed and selected from