000 03421nam a22006015i 4500
001 978-3-030-31511-5
003 DE-He213
005 20240730172128.0
007 cr nn 008mamaa
008 190916s2019 sz | s |||| 0|eng d
020 _a9783030315115
_9978-3-030-31511-5
024 7 _a10.1007/978-3-030-31511-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Trust Management
_h[electronic resource] :
_b15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings /
_cedited by Sjouke Mauw, Mauro Conti.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aIX, 169 p. 71 illus., 13 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v11738
505 0 _aImproving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits.
520 _aThis book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
650 0 _aData protection.
_97245
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic commerce.
_95589
650 0 _aApplication software.
_9101953
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputers and Society.
_931668
650 2 4 _ae-Commerce and e-Business.
_931772
650 2 4 _aComputer and Information Systems Applications.
_9101958
700 1 _aMauw, Sjouke.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101959
700 1 _aConti, Mauro.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9101961
710 2 _aSpringerLink (Online service)
_9101963
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030315108
776 0 8 _iPrinted edition:
_z9783030315122
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v11738
_9101965
856 4 0 _uhttps://doi.org/10.1007/978-3-030-31511-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c88041
_d88041