LEADER 04673nam 22007935 450 001 996466187703316 005 20200702125824.0 010 $a3-662-54455-5 024 7 $a10.1007/978-3-662-54455-6 035 $a(CKB)3710000001127404 035 $a(DE-He213)978-3-662-54455-6 035 $a(MiAaPQ)EBC6303426 035 $a(MiAaPQ)EBC5577097 035 $a(Au-PeEL)EBL5577097 035 $a(OCoLC)982578734 035 $a(PPN)200512331 035 $a(EXLCZ)993710000001127404 100 $a20170327d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPrinciples of Security and Trust$b[electronic resource] $e6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings /$fedited by Matteo Maffei, Mark Ryan 205 $a1st ed. 2017. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 321 p. 59 illus.) 225 1 $aSecurity and Cryptology ;$v10204 300 $aIncludes index. 311 $a3-662-54454-7 327 $aInformation Flow -- Timing-Sensitive Noninterference through Composition -- Quantifying vulnerability of secret generation using hyper-distributions -- A Principled Approach to Tracking Information Flow in the Presence of Libraries -- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory -- Security Protocols -- Automated verification of dynamic root of trust protocols -- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols -- On communication models when verifying equivalence properties -- A survey of attacks on Ethereum smart contracts (SoK) -- Security Policies -- Security Analysis of Cache Replacement Policies -- Model Checking Exact Cost for Attack Scenarios -- Postulates for Revocation Schemes -- Defense in Depth Formulation and Usage in Dynamic Access Control -- Information Leakage -- Compositional Synthesis of Leakage Resilient Programs -- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. 330 $aThis book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017. The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage. . 410 0$aSecurity and Cryptology ;$v10204 606 $aComputer security 606 $aData protection 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputers and civilization 606 $aComputers 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 615 0$aComputer security. 615 0$aData protection. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputers and civilization. 615 0$aComputers. 615 14$aSystems and Data Security. 615 24$aSecurity. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aComputers and Society. 615 24$aTheory of Computation. 676 $a005.8 702 $aMaffei$b Matteo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRyan$b Mark$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466187703316 996 $aPrinciples of Security and Trust$92022536 997 $aUNISA