Principles of Security and Trust : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Maffei, Matteo. (Editor ), Ryan, Mark. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10204
Materias:
LEADER 02633nam a22004215i 4500
001 000288722
005 20210831204350.0
007 cr nn 008mamaa
008 170327s2017 gw | s |||| 0|eng d
020 |a 9783662544556 
024 7 |a 10.1007/978-3-662-54455-6  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Principles of Security and Trust :  |b 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings /  |c edited by Matteo Maffei, Mark Ryan. 
250 |a 1st ed. 2017. 
260 # # |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2017. 
300 |a XII, 321 p. 59 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security and Cryptology ;  |v 10204 
505 0 |a Information Flow -- Timing-Sensitive Noninterference through Composition -- Quantifying vulnerability of secret generation using hyper-distributions -- A Principled Approach to Tracking Information Flow in the Presence of Libraries -- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory -- Security Protocols -- Automated verification of dynamic root of trust protocols -- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols -- On communication models when verifying equivalence properties -- A survey of attacks on Ethereum smart contracts (SoK) -- Security Policies -- Security Analysis of Cache Replacement Policies -- Model Checking Exact Cost for Attack Scenarios -- Postulates for Revocation Schemes -- Defense in Depth Formulation and Usage in Dynamic Access Control -- Information Leakage -- Compositional Synthesis of Leakage Resilient Programs -- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computers and civilization. 
650 0 |a Computers. 
650 1 4 |a Systems and Data Security. 
650 2 4 |a Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computers and Society. 
650 2 4 |a Theory of Computation. 
700 1 |a Maffei, Matteo.  |e editor. 
700 1 |a Ryan, Mark.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks