Normal view MARC view ISBD view

Security and Trust Management [electronic resource] : 19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings / edited by Ruben Rios, Joachim Posegga.

Contributor(s): Rios, Ruben [editor.] | Posegga, Joachim [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 14336Publisher: Cham : Springer Nature Switzerland : Imprint: Springer, 2023Edition: 1st ed. 2023.Description: X, 147 p. 31 illus., 25 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031471988.Subject(s): Data protection | Computer networks  | Software engineering | Application software | Data mining | Security Services | Data and Information Security | Computer Communication Networks | Software Engineering | Computer and Information Systems Applications | Data Mining and Knowledge DiscoveryAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online
Contents:
Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- 'State of the Union': Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.
In: Springer Nature eBookSummary: This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
    average rating: 0.0 (0 votes)
No physical items for this record

Impact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- 'State of the Union': Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.

This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.

There are no comments for this item.

Log in to your account to post a comment.