<span>The open access volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019. The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissi
Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26β27, 2019, Proceedings
β Scribed by Sjouke Mauw, Mauro Conti
- Publisher
- Springer International Publishing
- Year
- 2019
- Tongue
- English
- Leaves
- 177
- Series
- Lecture Notes in Computer Science 11738
- Edition
- 1st ed. 2019
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions.
The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
β¦ Table of Contents
Front Matter ....Pages i-ix
Improving Identity and Authentication Assurance in Research & Education Federations (Jule Anna Ziegler, Michael Schmidt, Mikael Linden)....Pages 1-18
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations (Umberto Morelli, Silvio Ranise, Damiano Sartori, Giada Sciarretta, Alessandro Tomasi)....Pages 19-35
Is a Smarter Grid Also Riskier? (Karin Bernsmed, Martin Gilje Jaatun, Christian FrΓΈystad)....Pages 36-52
BioID: A Privacy-Friendly Identity Document (Fatih Balli, F. BetΓΌl Durak, Serge Vaudenay)....Pages 53-70
On the Statistical Detection of Adversarial Instances over Encrypted Data (Mina Sheikhalishahi, Majid Nateghizad, Fabio Martinelli, Zekeriya Erkin, Marco Loog)....Pages 71-88
Understanding Attestation: Analyzing Protocols that Use Quotes (Joshua D. Guttman, John D. Ramsdell)....Pages 89-106
Challenges of Using Trusted Computing for Collaborative Data Processing (Paul Georg Wagner, Pascal Birnstill, JΓΌrgen Beyerer)....Pages 107-123
Secure Trust Evaluation Using Multipath and Referral Chain Methods (Mohammad G. Raeini, Mehrdad Nojoumian)....Pages 124-139
Personal Cross-Platform Reputation (Johannes BlΓΆmer, Nils LΓΆken)....Pages 140-157
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits (Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour)....Pages 158-167
Back Matter ....Pages 169-169
β¦ Subjects
Computer Science; Computers and Society; e-Commerce/e-business; Information Systems Applications (incl.Internet)
π SIMILAR VOLUMES
<p><span>This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First In
<span>This book constitutes the proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2019, held in Luxembourg, in September 2019.<br> The 10 full papers presented in this volume were carefully reviewed and selected from numerous submiss
<p><br>This book constitutes the refereed proceedings of the 12th International Workshop on Security and Trust Management, STM 2016, held in Heraklion, Crete, Greece, in September 2016, in conjunction with the 21st European Symposium Research in Computer Security, ESORICS 2016.<br>The 13 full papers
<p>This book constitutes the proceedings of the 13th International Workshop on Security and Trust Management, STM 2017, held in Oslo, Norway, in September 2017, in conjunction with the 22nd European Symposium Research in Computer Security, ESORICS 2017. The 10 full papers and 6 short papers were car