Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings

Author:   Frank Piessens ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1st ed. 2016
Volume:   9635
ISBN:  

9783662496343


Pages:   277
Publication Date:   22 March 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings


Add your own review!

Overview

This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols.   

Full Product Details

Author:   Frank Piessens ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1st ed. 2016
Volume:   9635
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   4.394kg
ISBN:  

9783662496343


ISBN 10:   3662496348
Pages:   277
Publication Date:   22 March 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Information Flow.- Faceted Dynamic Information Flow via Control and Data Monads.- Asymmetric Secure Multi-execution with Declassification.- A Taxonomy of Information Flow Monitors.- On Improvements of Low-Deterministic Security.- Tool Demonstration: JOANA.- Models and Applications.- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study.- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.- Correct Audit Logging: Theory and Practice.- The Value of Attack-Defence Diagrams.- Protocols.- Composing protocols with randomized actions.- Bounding the number of agents, for equivalence too.- AIF-omega: Set-Based Protocol Abstraction with Countable Families.- Computational Soundness Results for Stateful Applied pi Calculus.   

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List