LEADER 04742nam 22008295 450 001 996465723103316 005 20200630224046.0 010 $a3-662-49635-6 024 7 $a10.1007/978-3-662-49635-0 035 $a(CKB)3710000000627384 035 $a(SSID)ssj0001660241 035 $a(PQKBManifestationID)16440665 035 $a(PQKBTitleCode)TC0001660241 035 $a(PQKBWorkID)14987313 035 $a(PQKB)10544342 035 $a(DE-He213)978-3-662-49635-0 035 $a(MiAaPQ)EBC5578048 035 $a(PPN)192771876 035 $a(EXLCZ)993710000000627384 100 $a20160330d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPrinciples of Security and Trust$b[electronic resource] $e5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings /$fedited by Frank Piessens, Luca Viganò 205 $a1st ed. 2016. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 277 p. 69 illus. in color.) 225 1 $aSecurity and Cryptology ;$v9635 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-662-49634-8 320 $aIncludes bibliographic references and index. 327 $aInformation Flow -- Faceted Dynamic Information Flow via Control and Data Monads -- Asymmetric Secure Multi-execution with Declassification -- A Taxonomy of Information Flow Monitors -- On Improvements of Low-Deterministic Security -- Tool Demonstration: JOANA -- Models and Applications -- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study -- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels -- Correct Audit Logging: Theory and Practice -- The Value of Attack-Defence Diagrams -- Protocols -- Composing protocols with randomized actions -- Bounding the number of agents, for equivalence too -- AIF-omega: Set-Based Protocol Abstraction with Countable Families -- Computational Soundness Results for Stateful Applied pi Calculus. . 330 $aThis book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols. . 410 0$aSecurity and Cryptology ;$v9635 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aAlgorithms 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aAlgorithms. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.8 702 $aPiessens$b Frank$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aViganò$b Luca$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465723103316 996 $aPrinciples of Security and Trust$92022536 997 $aUNISA