Principles of Security and Trust
Springer Berlin (Verlag)
978-3-662-54454-9 (ISBN)
The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage.
Information Flow.- Timing-Sensitive Noninterference through Composition.- Quantifying vulnerability of secret generation using hyper-distributions.- A Principled Approach to Tracking Information Flow in the Presence of Libraries.- Secure Multi-Party Computation: Information Flow of Outputs and Game Theory.- Security Protocols.- Automated verification of dynamic root of trust protocols.- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols.- On communication models when verifying equivalence properties.- A survey of attacks on Ethereum smart contracts (SoK).- Security Policies.- Security Analysis of Cache Replacement Policies.- Model Checking Exact Cost for Attack Scenarios.- Postulates for Revocation Schemes.- Defense in Depth Formulation and Usage in Dynamic Access Control.- Information Leakage.- Compositional Synthesis of Leakage Resilient Programs.- Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows.
| Erscheinungsdatum | 06.04.2017 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XII, 321 p. 59 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 516 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Access Control • Applications • authentication • Computers and Society • Computer Science • Computer Security • conference proceedings • cryptography • data encryption • Ethical and social aspects of IT • Evaluation • formal methods • Informatics • information architecture • Maintenance and repairs • management of computing and information systems • Mathematical theory of computation • Model Checking • Network Security • privacy • Research • security • security protocols • software engineernig • systems and data security • Theory of Computation • user privacy • verification |
| ISBN-10 | 3-662-54454-7 / 3662544547 |
| ISBN-13 | 978-3-662-54454-9 / 9783662544549 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich