Vai al contenuto principale della pagina
Autore: | Ralf Küsters |
Titolo: | Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Pubblicazione: | Springer Nature, 2018 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | |
Edizione: | 1st ed. 2018. |
Descrizione fisica: | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina: | 005.8 |
Soggetto topico: | Computer security |
Computers | |
Data structures (Computer science) | |
Computer system failures | |
Systems and Data Security | |
Theory of Computation | |
Computing Milieux | |
Data Structures and Information Theory | |
System Performance and Evaluation | |
Soggetto non controllato: | security analysis |
cryptography | |
privacy | |
world wide web | |
semantics | |
programming languages | |
formal specification | |
program compilers | |
specifications | |
formal logic | |
computer science | |
separation logic | |
formal methods | |
data privacy | |
security systems | |
software engineering | |
computer software selection and evaluation | |
internet | |
verification | |
authentication | |
Persona (resp. second.): | BauerLujo |
KüstersRalf | |
Nota di contenuto: | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Sommario/riassunto: | This book is Open Access under a CC BY licence. |
Titolo autorizzato: | Principles of Security and Trust |
ISBN: | 3-319-89722-5 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910293140103321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |