default search action
STM 2015: Vienna, Austria
- Sara Foresti:
Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Lecture Notes in Computer Science 9331, Springer 2015, ISBN 978-3-319-24857-8
Security Metrics and Classification
- Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli:
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. 3-19 - Anna Lavygina, Alessandra Russo, Naranker Dulay:
Integrating Privacy and Safety Criteria into Planning Tasks. 20-36 - Teemu Kanstrén, Antti Evesti:
Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments. 37-51
Data Protection
- Riccardo De Masellis, Chiara Ghidini, Silvio Ranise:
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies. 55-71 - Erisa Karafili, Hanne Riis Nielson, Flemming Nielson:
How to Trust the Re-use of Data. 72-88 - Christian Zimmermann, Claus-Georg Nolte:
Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business. 89-104
Intrusion Detection and Software Vulnerabilities
- Andrea Pugliese, Antonino Rullo, Antonio Piccolo:
The AC-Index: Fast Online Detection of Correlated Alerts. 107-122 - Amr S. Abed, Charles Clancy, David S. Levy:
Intrusion Detection System for Applications Using Linux Containers. 123-135 - John Galea, Mark Vella:
SUDUTA: Script UAF Detection Using Taint Analysis. 136-151
Cryptographic Protocols
- Christopher Mann, Daniel Loebenberger:
Two-Factor Authentication for the Bitcoin Protocol. 155-171 - Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche:
Private Proximity Testing on Steroids: An NTRU-based Protocol. 172-184 - Milan Broz, Vashek Matyás:
Selecting a New Key Derivation Function for Disk Encryption. 185-199
Controlling Data Release
- Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo:
It's My Privilege: Controlling Downgrading in DC-Labels. 203-219 - Jason Crampton, Conrad Williams:
Obligations in PTaCL. 220-235 - Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Content and Key Management to Trace Traitors in Broadcasting Services. 236-252
Security Analysis, Risk Management, and Usability
- Ana Ferreira, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini:
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. 255-264 - Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz:
A Socio-Technical Investigation into Smartphone Security. 265-273 - Tatyana Ryutov, Michael D. Orosz, James Blythe, Detlof von Winterfeldt:
A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. 274-282 - Pankaj Pandey, Steven De Haes:
Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks. 283-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.