Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mina Sheikhalishahi, Andrea Saracino, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli |
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Erisa Karafili, Hanne Riis Nielson, Flemming Nielson |
How to Trust the Re-use of Data. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Pugliese 0001, Antonino Rullo, Antonio Piccolo |
The AC-Index: Fast Online Detection of Correlated Alerts. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christian Zimmermann 0002, Claus-Georg Nolte |
Towards Balancing Privacy and Efficiency: A Principal-Agent Model of Data-Centric Business. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anna Lavygina, Alessandra Russo, Naranker Dulay |
Integrating Privacy and Safety Criteria into Planning Tasks. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti (eds.) |
Security and Trust Management - 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Conrad Williams |
Obligations in PTaCL. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo De Masellis, Chiara Ghidini, Silvio Ranise |
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini |
In Cyber-Space No One Can Hear You S·CREAM - A Root Cause Analysis for Socio-Technical Security. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Melanie Volkamer, Karen Renaud, Oksana Kulyk, Sinem Emeröz |
A Socio-Technical Investigation into Smartphone Security. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Mann, Daniel Loebenberger |
Two-Factor Authentication for the Bitcoin Protocol. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Teemu Kanstrén, Antti Evesti |
Security Metrics, Secure Elements, and Operational Measurement Trust in Cloud Environments. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Waye, Pablo Buiras, Dan King, Stephen Chong, Alejandro Russo |
It's My Privilege: Controlling Downgrading in DC-Labels. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pankaj Pandey, Steven De Haes |
Design, Demonstration, and Evaluation of an Information Security Contract and Trading Mechanism to Hedge Information Security Risks. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Amr S. Abed, Charles Clancy, David S. Levy |
Intrusion Detection System for Applications Using Linux Containers. |
STM |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Filip Jurnecka, Martin Stehlík, Vashek Matyas |
Evaluation of Key Management Schemes in Wireless Sensor Networks. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Charles Morisset |
Monotonicity and Completeness in Attribute-Based Access Control. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez |
ROMEO: ReputatiOn Model Enhancing OpenID Simulator. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gamze Canova, Melanie Volkamer, Clemens Bergmann, Roland Borza |
NoPhish: An Anti-Phishing Education App. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Ranise, Riccardo Traverso |
ALPS: An Action Language for Policy Specification and Automated Safety Analysis. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sonia Santiago, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vangalur S. Alagar, Kaiyu Wan |
Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, James Sellwood |
Caching and Auditing in the RPPM Model. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori, Andrea Saracino |
Stateful Usage Control for Android Mobile Devices. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tobias Bamert, Christian Decker 0002, Roger Wattenhofer, Samuel Welten |
BlueWallet: The Secure Bitcoin Wallet. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paolo Modesti |
Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aleksandar S. Dimovski |
Ensuring Secure Non-interference of Programs by Game Semantics. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sjouke Mauw, Christian Damsgaard Jensen (eds.) |
Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Charles Morisset, Iryna Yevseyeva, Thomas Groß 0001, Aad P. A. van Moorsel |
A Formal Model for Soft Enforcement: Influencing the Decision-Maker. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Asad Ali 0001, Maribel Fernández |
Hybrid Enforcement of Category-Based Access Control. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thibaud Antignac, Daniel Le Métayer |
Privacy Architectures: Reasoning about Data Minimisation and Integrity. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pankaj Pandey, Einar Arthur Snekkenes |
Using Prediction Markets to Hedge Information Security Risks. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Niklas Grimm, Aniket Kate |
Lime: Data Lineage in the Malicious Environment. |
STM |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ryan D. Riley, Chris Clifton, Qutaibah M. Malluhi |
Maintaining Database Anonymity in the Presence of Queries. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Rocchetto, Luca Viganò 0001, Marco Volpe 0001, Giacomo Dalle Vedove |
Using Interpolation for the Verification of Security Protocols. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alessandra De Benedictis, Behzad Koosha, Massimiliano Albanese, Valentina Casola |
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Marco Botta, Davide Cavagnino, Victor Pomponiu |
Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Stocker, Frank Böhr |
IF-Net: A Meta-Model for Security-Oriented Process Specification. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux |
Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Nicola Dragoni, Sebastiano Gottardo |
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss |
Selective Disclosure in Datalog-Based Trust Management. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rafael Accorsi, Silvio Ranise (eds.) |
Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset |
Probabilistic Cost Enforcement of Security Policies. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas G. Koslowski, Christian Zimmermann 0002 |
Towards a Detective Approach to Process-Centered Resilience. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lil María Rodríguez-Henríquez, Debrup Chakraborty |
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang, Pierangela Samarati, Marinella Petrocchi (eds.) |
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ana Ferreira 0001, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas |
Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peeter Laud, Alisa Pankova |
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Costas Delakouridis, Christos Anagnostopoulos |
On Enhancement of 'Share The Secret' Scheme for Location Privacy. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis |
Evaluating the Manageability of Web Browsers Controls. |
STM |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001, M. Carmen Fernández Gago (eds.) |
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Francisco Moyano, M. Carmen Fernández Gago, Javier López 0001 |
Building Trust and Reputation In: A Development Framework for Trust Models Implementation. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Silvio Ranise, Anh Tuan Truong, Alessandro Armando |
Boosting Model Checking to Analyse Large ARBAC Policies. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simone Frau, Mohammad Torabi Dashti |
Analysis of Communicating Authorization Policies. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Valerio Genovese, Deepak Garg 0001, Daniele Rispoli |
Labeled Goal-Directed Search in Access Control Logic. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Mallios, Lujo Bauer, Dilsun Kirli Kaynar, Jay Ligatti |
Enforcing More with Less: Formalizing Target-Aware Run-Time Monitors. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Olga Ohrimenko, Hobart Reynolds, Roberto Tamassia |
Authenticating Email Search Results. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bart van Delft, Niklas Broberg, David Sands 0001 |
A Datalog Semantics for Paralocks. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia |
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Stelvio Cimato |
Constrained Role Mining. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sjouke Mauw, Selwyn Piramuthu |
A PUF-Based Authentication Protocol to Address Ticket-Switching of RFID-Tagged Items. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joep A. de Groot, Vinh T. Bui, Jean-Paul M. G. Linnartz, Johan Lukkien, Richard Verhoeven |
Software Authentication to Enhance Trust in Body Sensor Networks. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Robert Künnemann, Graham Steel |
YubiSecure? Formal Security Analysis Results for the Yubikey and YubiHSM. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Guillaume Dumas, Hicham Hossayni |
Matrix Powers Algorithms for Trust Evaluation in Public-Key Infrastructures. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001, Dusko Pavlovic |
Formalizing Physical Security Procedures. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Drábik, Fabio Martinelli, Charles Morisset |
Cost-Aware Runtime Enforcement of Security Policies. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michele Barletta, Silvio Ranise, Luca Viganò 0001 |
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Moti Geva, Amir Herzberg |
DOT-COM: Decentralized Online Trading and COMmerce. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis |
A Use-Based Approach for Enhancing UCON. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Giulio Caravagna, Gabriele Costa 0001, Giovanni Pardini |
Lazy Security Controllers. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meilof Veeningen, Benne de Weger, Nicola Zannone |
Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy. |
STM |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Valerio Genovese, Deepak Garg 0001 |
New Modalities for Access Control Logics: Permission, Control and Ratification. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bjørnar Solhaug, Ketil Stølen |
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Pablo Najera, Rodrigo Roman, Javier López 0001 |
Secure Architecure for the Integration of RFID and Sensors in Personal Networks. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Audun Jøsang |
Trust Extortion on the Internet. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Greveler, Benjamin Justus, Dennis Löhr |
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jamie Morgenstern, Deepak Garg 0001, Frank Pfenning |
A Proof-Carrying File System with Revocable and Use-Once Certificates. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Syed Sadiqur Rahman, Sadie Creese, Michael Goldsmith |
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Rudolph |
Trust Areas: A Security Paradigm for the Future Internet. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Rechert, Benjamin Greschbach |
Location Privacy in Relation to Trusted Peers. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Marsh 0001, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva |
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Henrich Christopher Pöhls, Focke Höhne |
The Role of Data Integrity in EU Digital Signature Legislation - Achieving Statutory Trust for Sanitizable Signature Schemes. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Chen, Jason Crampton |
Risk-Aware Role-Based Access Control. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Müller 0003, Stefan Katzenbeisser 0001 |
Hiding the Policy in Cryptographic Access Control. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Silvio Ranise |
Automated Analysis of Infinite State Workflows with Access Control Policies. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Neyire Deniz Sarier |
Security Notions of Biometric Remote Authentication Revisited. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Jamroga, Sjouke Mauw, Matthijs Melissen |
Fairness in Non-Repudiation Protocols. |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Cuéllar, Gilles Barthe, Alexander Pretschner, Javier López 0001 (eds.) |
Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers |
STM |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Md. Abdul Based, Stig Fr. Mjølsnes |
Universally Composable NIZK Protocol in an Internet Voting Scheme. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nadim Sarrouh, Florian Eilers, Uwe Nestmann, Ina Schieferdecker |
Defamation-Free Networks through User-Centered Data Control. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Michele Bezzi, Sabrina De Capitani di Vimercati, Giovanni Livraga, Pierangela Samarati |
Protecting Privacy of Sensitive Value Distributions in Data Release. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ralf Sasse, Santiago Escobar 0001, Catherine Meadows 0001, José Meseguer 0001 |
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Silvio Ranise |
Automated Symbolic Analysis of ARBAC-Policies. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Peter Hartmann, Monika Maidl, David von Oheimb, Richard Robinson |
A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management - Automated Software Distribution for Airplanes. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ioanna Dionysiou, K. Harald Gjermundrød, David E. Bakken |
GUTS: A Framework for Adaptive and Configureable Grid User Trust Service. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Charles Morisset |
An Auto-delegation Mechanism for Access Control Systems. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Flavio D. Garcia, Bart Jacobs 0001 |
Privacy-Friendly Energy-Metering via Homomorphic Encryption. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Leanid Krautsevich, Aliaksandr Lazouski, Fabio Martinelli, Artsiom Yautsiukhin |
Influence of Attribute Freshness on Decision Making in Usage Control. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, Wayne Mac Adams, Barry O'Sullivan |
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Garg 0001, Frank Pfenning |
Stateful Authorization Logic: - Proof Theory and a Case Study. |
STM |
2010 |
DBLP DOI BibTeX RDF |
|