000 03342nam a22006015i 4500
001 978-3-030-31511-5
003 DE-He213
005 20240423125242.0
007 cr nn 008mamaa
008 190916s2019 sz | s |||| 0|eng d
020 _a9783030315115
_9978-3-030-31511-5
024 7 _a10.1007/978-3-030-31511-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Trust Management
_h[electronic resource] :
_b15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26–27, 2019, Proceedings /
_cedited by Sjouke Mauw, Mauro Conti.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aIX, 169 p. 71 illus., 13 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11738
505 0 _aImproving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.
520 _aThis book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
650 0 _aData protection.
650 0 _aComputers and civilization.
650 0 _aElectronic commerce.
650 0 _aApplication software.
650 1 4 _aData and Information Security.
650 2 4 _aComputers and Society.
650 2 4 _ae-Commerce and e-Business.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aMauw, Sjouke.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aConti, Mauro.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030315108
776 0 8 _iPrinted edition:
_z9783030315122
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11738
856 4 0 _uhttps://doi.org/10.1007/978-3-030-31511-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c175904
_d175904