Linked e-resources
Details
Table of Contents
Uncertainty, Subjectivity, Trust and Risk: How It All Fits together / Bjr̜nar Solhaug and Ketil Stl̜en
Trust Extortion on the Internet / Audun Js̜ang
Trust Areas: A Security Paradigm for the Future Internet / Carsten Rudolph
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security / Stephen Marsh, Sylvie Nol͡, Tim Storer, Yao Wang and Pam Briggs, et al.
A Proof-Carrying File System with Revocable and Use-Once Certificates / Jamie Morgenstern, Deepak Garg and Frank Pfenning
New Modalities for Access Control Logics: Permission, Control and Ratification / Valerio Genovese and Deepak Garg
Security Notions of Biometric Remote Authentication Revisited / Neyire Deniz Sarier
Hiding the Policy in Cryptographic Access Control / Sascha Mller and Stefan Katzenbeisser
Location Privacy in Relation to Trusted Peers / Klaus Rechert and Benjamin Greschbach
Fairness in Non-Repudiation Protocols / Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen
Risk-Aware Role-Based Access Control / Liang Chen and Jason Crampton
Automated Analysis of Infinite State Workflows with Access Control Policies / Alessandro Armando and Silvio Ranise
The Role of Data Integrity in EU Digital Signature Legislation
Achieving Statutory Trust for Sanitizable Signature Schemes / Henrich C. Ph̲ls and Focke Hh̲ne
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms / Ulrich Greveler, Benjamin Justus and Dennis Lh̲r
Secure Architecure for the Integration of RFID and Sensors in Personal Networks / Pablo Najera, Rodrigo Roman and Javier Lopez
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources / Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith.
Trust Extortion on the Internet / Audun Js̜ang
Trust Areas: A Security Paradigm for the Future Internet / Carsten Rudolph
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security / Stephen Marsh, Sylvie Nol͡, Tim Storer, Yao Wang and Pam Briggs, et al.
A Proof-Carrying File System with Revocable and Use-Once Certificates / Jamie Morgenstern, Deepak Garg and Frank Pfenning
New Modalities for Access Control Logics: Permission, Control and Ratification / Valerio Genovese and Deepak Garg
Security Notions of Biometric Remote Authentication Revisited / Neyire Deniz Sarier
Hiding the Policy in Cryptographic Access Control / Sascha Mller and Stefan Katzenbeisser
Location Privacy in Relation to Trusted Peers / Klaus Rechert and Benjamin Greschbach
Fairness in Non-Repudiation Protocols / Wojciech Jamroga, Sjouke Mauw and Matthijs Melissen
Risk-Aware Role-Based Access Control / Liang Chen and Jason Crampton
Automated Analysis of Infinite State Workflows with Access Control Policies / Alessandro Armando and Silvio Ranise
The Role of Data Integrity in EU Digital Signature Legislation
Achieving Statutory Trust for Sanitizable Signature Schemes / Henrich C. Ph̲ls and Focke Hh̲ne
Mutual Remote Attestation: Enabling System Cloning for TPM Based Platforms / Ulrich Greveler, Benjamin Justus and Dennis Lh̲r
Secure Architecure for the Integration of RFID and Sensors in Personal Networks / Pablo Najera, Rodrigo Roman and Javier Lopez
Accepting Information with a Pinch of Salt: Handling Untrusted Information Sources / Syed Sadiqur Rahman, Sadie Creese and Michael Goldsmith.