000 03870nam a22006135i 4500
001 978-3-031-47198-8
003 DE-He213
005 20240730201649.0
007 cr nn 008mamaa
008 231029s2023 sz | s |||| 0|eng d
020 _a9783031471988
_9978-3-031-47198-8
024 7 _a10.1007/978-3-031-47198-8
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity and Trust Management
_h[electronic resource] :
_b19th International Workshop, STM 2023, The Hague, The Netherlands, September 28, 2023, Proceedings /
_cedited by Ruben Rios, Joachim Posegga.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aX, 147 p. 31 illus., 25 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14336
505 0 _aImpact of Consensus Protocols on the Efficiency of Registration and Authentication process in Self-Sovereign Identity -- Biometric-Based Password Management -- 'State of the Union': Evaluating Open Source Zero Trust Components -- Secure Stitch: Unveiling the Fabric of Security Patterns for the Internet of Things -- Towards a unified abstract architecture to coherently and generically describe security goals and risks of AI systems -- Decentralized Global Trust Registry Platform for trust discovery and verification of e-Health credentials using TRAIN: COVID-19 Certificate use case -- Privacy-Preserving NN for IDS: A Study on the impact of TFHE restrictions -- Analyzing and Improving Eligibility Verifiability of the Proposed Belgian Remote Voting System -- Consent as mechanism to preserve information privacy: Its origin, evolution, and current relevance.
520 _aThis book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions. The workshop presents papers with topics such as security and privacy, trust models, security services, authentication, identity management, systems security, distributed systems security, privacy-preserving protocols.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aSoftware engineering.
_94138
650 0 _aApplication software.
_9168200
650 0 _aData mining.
_93907
650 1 4 _aSecurity Services.
_978910
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9168201
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aComputer and Information Systems Applications.
_9168202
650 2 4 _aData Mining and Knowledge Discovery.
_9168203
700 1 _aRios, Ruben.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168204
700 1 _aPosegga, Joachim.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168205
710 2 _aSpringerLink (Online service)
_9168206
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031471971
776 0 8 _iPrinted edition:
_z9783031471995
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14336
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-47198-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96649
_d96649