Atnaujinkite slapukų nuostatas

El. knyga: Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings

Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 10204
  • Išleidimo metai: 27-Mar-2017
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783662544556
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 10204
  • Išleidimo metai: 27-Mar-2017
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783662544556

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage. 
Information Flow
Timing-Sensitive Noninterference through Composition
3(23)
Willard Rafnsson
Limin Jia
Lujo Bauer
Quantifying Vulnerability of Secret Generation Using Hyper-Distributions
26(23)
Mario S. Alvim
Piotr Mardziel
Michael Hicks
A Principled Approach to Tracking Information Flow in the Presence of Libraries
49(22)
Daniel Hedin
Alexander Sjosten
Frank Piessens
Andrei Sabelfeld
Secure Multi-party Computation: Information Flow of Outputs and Game Theory
71(24)
Patrick Ah-Fat
Michael Huth
Security Protocols
Automated Verification of Dynamic Root of Trust Protocols
95(22)
Sergiu Bursuc
Christian Johansen
Shiwei Xu
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
117(24)
Jannik Dreier
Charles Dumenil
Steve Kremer
Ralf Sasse
On Communication Models When Verifying Equivalence Properties
141(23)
Kushal Babel
Vincent Cheval
Steve Kremer
A Survey of Attacks on Ethereum Smart Contracts (SoK)
164(25)
Nicola Atzei
Massimo Bartoletti
Tiziana Cimoli
Security Policies
Security Analysis of Cache Replacement Policies
189(21)
Pablo Canones
Boris Kopf
Jan Reineke
Model Checking Exact Cost for Attack Scenarios
210(22)
Zaruhi Aslanyan
Flemming Nielson
Postulates for Revocation Schemes
232(21)
Marcos Cramer
Giovanni Casini
Defense in Depth Formulation and Usage in Dynamic Access Control
253(24)
Ridha Khedri
Owain Jones
Mohammed Alabbad
Information Leakage
Compositional Synthesis of Leakage Resilient Programs
277(21)
Arthur Blot
Masaki Yamamoto
Tachio Terauchi
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows
298(23)
Martin Pettai
Peeter Laud
Author Index 321