04716 am 22009493u 450 99646558310331620230125185215.03-319-89722-510.1007/978-3-319-89722-6(CKB)4100000003359650(DE-He213)978-3-319-89722-6(MiAaPQ)EBC5578031(Au-PeEL)EBL5578031(OCoLC)1066185056(oapen)https://directory.doabooks.org/handle/20.500.12854/56986(PPN)226696596(EXLCZ)99410000000335965020180413d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierPrinciples of Security and Trust[electronic resource] 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings /edited by Lujo Bauer, Ralf Küsters1st ed. 2018.Springer Nature2018Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XIV, 347 p. 85 illus.) Security and Cryptology ;108043-319-89721-7 Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.This book is Open Access under a CC BY licence.Security and Cryptology ;10804Computer securityComputersData structures (Computer science)Computer system failuresSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Theory of Computationhttps://scigraph.springernature.com/ontologies/product-market-codes/I16005Computing Milieuxhttps://scigraph.springernature.com/ontologies/product-market-codes/I24008Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009System Performance and Evaluationhttps://scigraph.springernature.com/ontologies/product-market-codes/I13049security analysiscryptographyprivacyworld wide websemanticsprogramming languagesformal specificationprogram compilersspecificationsformal logiccomputer scienceseparation logicformal methodsdata privacysecurity systemssoftware engineeringcomputer software selection and evaluationinternetverificationauthenticationComputer security.Computers.Data structures (Computer science).Computer system failures.Systems and Data Security.Theory of Computation.Computing Milieux.Data Structures and Information Theory.System Performance and Evaluation.005.8Ralf Küstersauth1354886Bauer Lujoedthttp://id.loc.gov/vocabulary/relators/edtKüsters Ralfedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465583103316Principles of Security and Trust3358589UNISA