ERCIM Security and Trust Management Workshop

被引:0
|
作者
Accorsi, Rafael [1 ]
Ranise, Silvio [2 ]
机构
[1] Univ Freiburg, Business Proc Secur Grp, Freiburg, Germany
[2] Ctr Informat Technol, Fdn Bruno Kessler, Trento, Italy
来源
ERCIM NEWS | 2013年 / 95期
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
ERCIM's Working Group "Security and Trust Management" (STM) is responsible for organizing the annual "International ERCIM STM Workshop", which provides an exciting setting to catch up with the state-of-the-art in this area. The ninth edition of this workshop took place in Egham, UK, in September 2013, in conjunction with ESORICS 2013, the "European Symposium on Research in Computer Security".
引用
收藏
页码:6 / 6
页数:1
相关论文
共 50 条
  • [21] Security and trust management in opportunistic networks: a survey
    Wu, Yue
    Zhao, Yimeng
    Riguidel, Michel
    Wang, Guanghao
    Yi, Ping
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (09) : 1812 - 1827
  • [22] Goal Setting and Trust in a Security Management Context
    Koskosas, Ioannis
    [J]. INFORMATION SECURITY JOURNAL, 2008, 17 (03): : 151 - 161
  • [23] Security, Safety and Trust Management (SSTM '17)
    Abbas, Haider
    Orlandi, Eugenio
    Khan, Farrukh Aslam
    Popov, Oliver
    Masood, Asif
    [J]. 2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, : 242 - 243
  • [24] Security Safety and Trust Management (SSTM' 19)
    Abbas, Haider
    Kifayat, Kashif
    Khan, Farrukh Aslam
    Masood, Asif
    Rashid, Imran
    Khan, Fawad
    [J]. 2019 IEEE 28TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2019, : 196 - 197
  • [25] Trust management and network layer security protocols
    Blaze, M
    Anderson, R
    Roe, M
    Lee, S
    Gligor, V
    Christianson, B
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 109 - 118
  • [26] An Optimization of Security and Trust Management in Distributed Systems
    Ahmed, Alsharif Mohamed Y.
    Qian, Depei
    [J]. PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 120 - 126
  • [27] Trust management and network layer security protocols
    Blaze, M
    Ioannidis, J
    Keromytis, AD
    [J]. SECURITY PROTOCOLS, 2000, 1796 : 103 - 108
  • [28] EVOL 2008 - Fourth International ERCIM Workshop on Software Evolution and Evolvability
    Wermelinger, Michel
    Wernick, Paul
    Mens, Tom
    [J]. ERCIM NEWS, 2009, (76): : 6 - 6
  • [29] 4th international workshop on P2P data management, security and trust - 3rd international workshop on data management in global data repositories
    Madria, Sanjay Kumar
    Mondal, Anirban
    Mohania, Mukesh K.
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 775 - +
  • [30] Smartphone security: understanding smartphone users' trust in information security management
    Jang, Yu-Teng
    Chang, Shuchih Ernest
    Tsai, Yi-Jey
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (09) : 1313 - 1321