Principles of Security and Trust
-15%
portes grátis
Principles of Security and Trust
7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
Bauer, Lujo; Kuesters, Ralf
Springer International Publishing AG
04/2018
347
Mole
Inglês
9783319897219
15 a 20 dias
557
Descrição não disponível.
Information Flow and Non-Intereference.- What's the Over/Under? Probabilistic Bounds on Information Leakage.- Secure Information Release in Timed Automata.- Compositional Non-Interference for Concurrent Programs via Separation and Framing.- The Meaning of Memory Safety.- Leakage, Information Flow, and Protocols.- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage.- Leakage and Protocol Composition in a Game-theoretic Perspective.- Equivalence Properties by Typing in Cryptographic Branching Protocols.- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.- Smart Contracts and Privacy.- SoK: Unraveling Bitcoin Smart Contracts.- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts.- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts.- UniTraX: Protecting Data Privacy with Discoverable Biases.- Firewalls and Attack-Defense Trees.- Transcompiling Firewalls.- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
authentication;computer science;computer software selection and evaluation;cryptography;data privacy;formal logic;formal methods;formal specification;internet;privacy;program compilers;programming languages;security analysis;security systems;semantics;separation logic;software engineering;specifications;verification;world wide web
Information Flow and Non-Intereference.- What's the Over/Under? Probabilistic Bounds on Information Leakage.- Secure Information Release in Timed Automata.- Compositional Non-Interference for Concurrent Programs via Separation and Framing.- The Meaning of Memory Safety.- Leakage, Information Flow, and Protocols.- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage.- Leakage and Protocol Composition in a Game-theoretic Perspective.- Equivalence Properties by Typing in Cryptographic Branching Protocols.- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience.- Smart Contracts and Privacy.- SoK: Unraveling Bitcoin Smart Contracts.- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts.- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts.- UniTraX: Protecting Data Privacy with Discoverable Biases.- Firewalls and Attack-Defense Trees.- Transcompiling Firewalls.- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
authentication;computer science;computer software selection and evaluation;cryptography;data privacy;formal logic;formal methods;formal specification;internet;privacy;program compilers;programming languages;security analysis;security systems;semantics;separation logic;software engineering;specifications;verification;world wide web