1.

Record Nr.

UNISA996465583103316

Autore

Ralf Küsters

Titolo

Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters

Pubbl/distr/stampa

Springer Nature, 2018

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018

ISBN

3-319-89722-5

Edizione

[1st ed. 2018.]

Descrizione fisica

1 online resource (XIV, 347 p. 85 illus.)

Collana

Security and Cryptology ; ; 10804

Disciplina

005.8

Soggetti

Computer security

Computers

Data structures (Computer science)

Computer system failures

Systems and Data Security

Theory of Computation

Computing Milieux

Data Structures and Information Theory

System Performance and Evaluation

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience



-- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.

Sommario/riassunto

This book is Open Access under a CC BY licence.