Security and trust management : 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, proceedings

Integrating Trust and Economic Theories with Knowledge Science for Dependable Service Automation.- Privacy Architectures: Reasoning About Data Minimisation and Integrity.- Monotonicity and Completeness in Attribute-based Access Control.- Caching and Auditing in the RPPM Model.- BlueWallet: The Secure Bitcoin Wallet.- Ensuring Secure Non-interference of Programs by Game Semantics.- Stateful Usage Control for Android Mobile Devices.- A Formal Model for Soft Enforcement.- Using Prediction Markets to Hedge Information Security Risks.- ALPS: An Action Language for Policy Specification and Automated Safety Analysis.- A Formal Definition of Protocol Indistinguishability and its Verification Using Maude-NPA.- Hybrid Enforcement of Category-Based Access Control.- Lime: Data Lineage in the Malicious Environment.- NoPhish - An Anti-Phishing Education App.- ROMEO: Reputation Model Enhancing OpenID Simulator.- Evaluation of key management schemes in wireless sensor networks.- Efficient Java Code Generation of Security Protocols specified in AnB/AnBx.