|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910349278803321 |
|
|
Titolo |
Security and Trust Management : 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings / / edited by Sjouke Mauw, Mauro Conti |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2019.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (IX, 169 p. 71 illus., 13 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 11738 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computers and civilization |
E-commerce |
Application software |
Systems and Data Security |
Computers and Society |
e-Commerce/e-business |
Information Systems Applications (incl. Internet) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Improving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located |
|
|
|
|
|
|
|
|
|
|
with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs. |
|
|
|
|
|
| |