top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Principles of Security and Trust [[electronic resource] ] : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings / / edited by Matteo Maffei, Mark Ryan
Principles of Security and Trust [[electronic resource] ] : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings / / edited by Matteo Maffei, Mark Ryan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 321 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computers
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computers and Society
Theory of Computation
ISBN 3-662-54455-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Flow -- Timing-Sensitive Noninterference through Composition -- Quantifying vulnerability of secret generation using hyper-distributions -- A Principled Approach to Tracking Information Flow in the Presence of Libraries -- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory -- Security Protocols -- Automated verification of dynamic root of trust protocols -- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols -- On communication models when verifying equivalence properties -- A survey of attacks on Ethereum smart contracts (SoK) -- Security Policies -- Security Analysis of Cache Replacement Policies -- Model Checking Exact Cost for Attack Scenarios -- Postulates for Revocation Schemes -- Defense in Depth Formulation and Usage in Dynamic Access Control -- Information Leakage -- Compositional Synthesis of Leakage Resilient Programs -- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
Record Nr. UNISA-996466187703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles of Security and Trust : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings / / edited by Matteo Maffei, Mark Ryan
Principles of Security and Trust : 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings / / edited by Matteo Maffei, Mark Ryan
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 321 p. 59 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Data encryption (Computer science)
Management information systems
Computer science
Computers and civilization
Computers
Systems and Data Security
Security
Cryptology
Management of Computing and Information Systems
Computers and Society
Theory of Computation
ISBN 3-662-54455-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Information Flow -- Timing-Sensitive Noninterference through Composition -- Quantifying vulnerability of secret generation using hyper-distributions -- A Principled Approach to Tracking Information Flow in the Presence of Libraries -- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory -- Security Protocols -- Automated verification of dynamic root of trust protocols -- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols -- On communication models when verifying equivalence properties -- A survey of attacks on Ethereum smart contracts (SoK) -- Security Policies -- Security Analysis of Cache Replacement Policies -- Model Checking Exact Cost for Attack Scenarios -- Postulates for Revocation Schemes -- Defense in Depth Formulation and Usage in Dynamic Access Control -- Information Leakage -- Compositional Synthesis of Leakage Resilient Programs -- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
Record Nr. UNINA-9910483190603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / / edited by Matteo Maffei, Emilio Tuosto
Trustworthy Global Computing [[electronic resource] ] : 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / / edited by Matteo Maffei, Emilio Tuosto
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XV, 193 p. 50 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Machine theory
Application software
Computer engineering
Computer networks
Data and Information Security
Formal Languages and Automata Theory
Computer and Information Systems Applications
Computer Engineering and Networks
ISBN 3-662-45917-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM – Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.
Record Nr. UNISA-996211261403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trustworthy Global Computing : 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / / edited by Matteo Maffei, Emilio Tuosto
Trustworthy Global Computing : 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / / edited by Matteo Maffei, Emilio Tuosto
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XV, 193 p. 50 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Machine theory
Application software
Computer engineering
Computer networks
Data and Information Security
Formal Languages and Automata Theory
Computer and Information Systems Applications
Computer Engineering and Networks
ISBN 3-662-45917-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM – Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.
Record Nr. UNINA-9910483259603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui