Principles of security and trust : 7th International Conference, POST 2018, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / Lujo Bauer, Ralf Küsters (eds.).

By: (7th : POST (Conference) (7th : 2018 : Thessalonikē, Greece)
Contributor(s): Bauer, Lujo [editor.] | Küsters, Ralf [editor.] | ETAPS (Conference) (21st : 2018 : Thessalonikē , Greece) [jointly held conference.]
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 10804.; Lecture notes in computer science: ; LNCS sublibrary: Publisher: Cham, Switzerland : Springer Open, 2018Description: 1 online resource (xiv, 347 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783319897226; 3319897225Other title: POST 2018Subject(s): Computer security -- Congresses | Data encryption (Computer science) -- Congresses | Computer science | Information technology: general issues | Algorithms & data structures | Systems analysis & design | Computer security | Computers -- Computer Science | Computers -- Social Aspects -- Human-Computer Interaction | Computers -- Information Theory | Computers -- Hardware -- Handheld Devices | Computers -- Security -- General | Computer security | Data encryption (Computer science)Genre/Form: Electronic books. | Conference papers and proceedings. DDC classification: 005.8 LOC classification: QA76.9.A25 | P67 2018ebOnline resources: Click here to access online
Contents:
Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Summary: This book is Open Access under a CC BY licence.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

International conference proceedings.

Open access. GW5XE

Includes bibliographical references and index.

Online resource; title from PDF title page (SpringerLink, viewed April 17, 2018).

Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.

This book is Open Access under a CC BY licence.

There are no comments for this item.

to post a comment.

Powered by Koha