LEADER 03937nam 22007095 450 001 996558464603316 005 20231029103201.0 010 $a3-031-47198-9 024 7 $a10.1007/978-3-031-47198-8 035 $a(MiAaPQ)EBC30836055 035 $a(Au-PeEL)EBL30836055 035 $a(DE-He213)978-3-031-47198-8 035 $a(PPN)272914207 035 $a(EXLCZ)9928637920000041 100 $a20231029d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Trust Management$b[electronic resource] $e19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings /$fedited by Ruben Rios, Joachim Posegga 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (153 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14336 311 08$aPrint version: Rios, Ruben Security and Trust Management Cham : Springer,c2023 9783031471971 320 $aIncludes bibliographical references and index. 327 $aImpact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- ?State of the Union?: Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance. 330 $aThis book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14336 606 $aData protection 606 $aComputer networks 606 $aSoftware engineering 606 $aApplication software 606 $aData mining 606 $aSecurity Services 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aComputer and Information Systems Applications 606 $aData Mining and Knowledge Discovery 615 0$aData protection. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aData mining. 615 14$aSecurity Services. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aComputer and Information Systems Applications. 615 24$aData Mining and Knowledge Discovery. 676 $a005.8 702 $aRios$b Ruben$f1983- 702 $aPosegga$b Joachim 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996558464603316 996 $aSecurity and Trust Management$93590338 997 $aUNISA