000914845 000__ 03333cam\a2200553Ii\4500 000914845 001__ 914845 000914845 005__ 20230306150545.0 000914845 006__ m\\\\\o\\d\\\\\\\\ 000914845 007__ cr\cn\nnnunnun 000914845 008__ 190927s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000914845 019__ $$a1121267363 000914845 020__ $$a9783030315115$$q(electronic book) 000914845 020__ $$a3030315118$$q(electronic book) 000914845 020__ $$z9783030315108 000914845 0247_ $$a10.1007/978-3-030-31511-5$$2doi 000914845 0247_ $$a10.1007/978-3-030-31 000914845 035__ $$aSP(OCoLC)on1121075326 000914845 035__ $$aSP(OCoLC)1121075326$$z(OCoLC)1121267363 000914845 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dLQU$$dUKMGB$$dEBLCP 000914845 049__ $$aISEA 000914845 050_4 $$aQA76.9.A25$$bS76 2019eb 000914845 08204 $$a005.8$$223 000914845 1112_ $$aSTM (Conference)$$n(15th :$$d2019 :$$cLuxembourg, Luxembourg) 000914845 24510 $$aSecurity and trust management :$$b15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings /$$cSjouke Mauw, Mauro Conti (eds.). 000914845 2463_ $$aSTM 2019 000914845 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000914845 300__ $$a1 online resource (ix, 169 pages) :$$billustrations. 000914845 336__ $$atext$$btxt$$2rdacontent 000914845 337__ $$acomputer$$bc$$2rdamedia 000914845 338__ $$aonline resource$$bcr$$2rdacarrier 000914845 4901_ $$aLecture notes in computer science ;$$v11738 000914845 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000914845 500__ $$aInternational conference proceedings. 000914845 500__ $$aIncludes author index. 000914845 5050_ $$aImproving Identity and Authentication Assurance in Research and Education Federations -- Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations -- Is a Smarter Grid Also Riskier -- BioID: a Privacy-Friendly Identity Document -- On the Statistical Detection of Adversarial Instances over Encrypted Data -- Understanding Attestation: Analyzing Protocols that use Quotes -- Challenges of Using Trusted Computing for Collaborative Data Processing -- Secure Trust Evaluation Using Multipath and Referral Chain Methods -- Personal Cross-Platform Reputation -- An OBDD-based Technique for the Efficient Synthesis of Garbled Circuits. 000914845 506__ $$aAccess limited to authorized users. 000914845 520__ $$aThis book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions. The papers present novel research on all theoretical and practical aspects of security and trust in ICTs. 000914845 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 23, 2019). 000914845 650_0 $$aComputer security$$vCongresses. 000914845 650_0 $$aData encryption (Computer science)$$vCongresses. 000914845 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000914845 7001_ $$aMauw, S.,$$eeditor. 000914845 7001_ $$aConti, Mauro$$c(Associate professor),$$eeditor. 000914845 830_0 $$aLecture notes in computer science ;$$v11738. 000914845 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000914845 852__ $$bebk 000914845 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-31511-5$$zOnline Access$$91397441.1 000914845 909CO $$ooai:library.usi.edu:914845$$pGLOBAL_SET 000914845 980__ $$aEBOOK 000914845 980__ $$aBIB 000914845 982__ $$aEbook 000914845 983__ $$aOnline 000914845 994__ $$a92$$bISE