Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings

Author:   Frank Piessens ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   1st ed. 2016
Volume:   9635
ISBN:  

9783662496343


Pages:   277
Publication Date:   22 March 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Frank Piessens ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   1st ed. 2016
Volume:   9635
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   4.394kg
ISBN:  

9783662496343


ISBN 10:   3662496348
Pages:   277
Publication Date:   22 March 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Information Flow.- Faceted Dynamic Information Flow via Control and Data Monads.- Asymmetric Secure Multi-execution with Declassification.- A Taxonomy of Information Flow Monitors.- On Improvements of Low-Deterministic Security.- Tool Demonstration: JOANA.- Models and Applications.- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study.- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.- Correct Audit Logging: Theory and Practice.- The Value of Attack-Defence Diagrams.- Protocols.- Composing protocols with randomized actions.- Bounding the number of agents, for equivalence too.- AIF-omega: Set-Based Protocol Abstraction with Countable Families.- Computational Soundness Results for Stateful Applied pi Calculus.   

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List