Volume 197,
Number 1,
February 2008
Proceedings of the First International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM 2007)
- Fabio Massacci, Frank Piessens:
Preface.
1-2
- Srijith Krishnan Nair, Patrick N. D. Simpson, Bruno Crispo, Andrew S. Tanenbaum:
A Virtual Machine Based Information Flow Control System for Policy Enforcement.
3-16
- David Aspinall, Patrick Maier, Ian Stark:
Monitoring External Resources in Java MIDP.
17-30
- Tom Goovaerts, Bart De Win, Wouter Joosen:
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies.
31-43
- Irem Aktug, Katsiaryna Naliuka:
ConSpec - A Formal Language for Policy Specification.
45-58
- Dries Schellekens, Brecht Wyseur, Bart Preneel:
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules.
59-72
- Sid Stamm, Nicholas Paul Sheppard, Reihaneh Safavi-Naini:
Implementing Trusted Terminals with a and SITDRM.
73-85
Volume 197,
Number 2,
February 2008
Proceedings of the 3rd International Workshop on Security and Trust Management (STM 2007)
- Luca Compagna, Volkmar Lotz, Fabio Massacci:
Preface.
1-2
- Todd R. Andel, Alec Yasinsac:
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols.
3-14
- Atle Refsdal, Ketil Stølen:
Extending UML Sequence Diagrams to Model Trust-dependent Behavior With the Aim to Support Risk Analysis.
15-29
- Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic:
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks.
31-43
- Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews:
Managing Conflicts of Interest in Virtual Organisations.
45-56
- Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Francesco Saverio Proto, Simone Teofili:
The SPARTA Pseudonym and Authorization System.
57-71
- Adam Wierzbicki:
The Case for Fairness of Trust Management.
73-89
- J. F. Zandbelt, R. J. Hulsebosch, Mortaza S. Bargh, R. Arends:
Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC.
91-103
- Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch:
Trust-enhanced Security in Location-based Adaptive Authentication.
105-119
- Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna:
Analyzing Security Scenarios Using Defence Trees and Answer Set Programming.
121-129
- Jared Cordasco, Susanne Wetzel:
Cryptographic Versus Trust-based Methods for MANET Routing Security.
131-140
- Raghav Bhaskar, K. Chandrasekaran, Satyanarayana V. Lokam, P. L. Montgomery, R. Venkatesan, Yacov Yacobi:
Vulnerabilities in Anonymous Credential Systems.
141-148
- Alessandro Basso, Michele Miraglia:
Avoiding Massive Automated Voting in Internet Polls.
149-157
- Ton van Deursen, Paul Koster, Milan Petkovic:
Hedaquin: A Reputation-based Health Data Quality Indicator.
159-167
- Joachim Biskup, Julia Hielscher, Sandra Wortmann:
A Trust- and Property-based Access Control Model.
169-177
Copyright © Mon Mar 15 04:00:59 2010
by Michael Ley (ley@uni-trier.de)