Principles of Security and Trust

5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2–8, 2016, Proceedings

  • Frank Piessens
  • Luca Viganò
Conference proceedings POST 2016

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9635)

Also part of the Security and Cryptology book sub series (LNSC, volume 9635)

Table of contents

  1. Front Matter
    Pages I-X
  2. Information Flow

    1. Front Matter
      Pages 1-1
    2. Thomas Schmitz, Dustin Rhodes, Thomas H. Austin, Kenneth Knowles, Cormac Flanagan
      Pages 3-23
    3. Iulia Boloşteanu, Deepak Garg
      Pages 24-45
    4. Nataliia Bielova, Tamara Rezk
      Pages 46-67
    5. Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting
      Pages 68-88
    6. Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting
      Pages 89-93
  3. Models and Applications

    1. Front Matter
      Pages 95-95
    2. Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka
      Pages 139-162
    3. Holger Hermanns, Julia Krämer, Jan Krčál, Mariëlle Stoelinga
      Pages 163-185
  4. Protocols

    1. Front Matter
      Pages 187-187
    2. Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan
      Pages 189-210
    3. Véronique Cortier, Antoine Dallon, Stéphanie Delaune
      Pages 211-232
    4. Sebastian Mödersheim, Alessandro Bruni
      Pages 233-253
    5. Jianxiong Shao, Yu Qin, Dengguo Feng
      Pages 254-275
  5. Back Matter
    Pages 277-277

About these proceedings


This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016.

The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols.   


browser security distributed systems security formal security models security protocols trust frameworks access control anonymity applied pi calculus authentication computational soundness confidentiality information flow control invariant generation logic and verification privacy provenance security requirements software security engineering stateful protocols test generation

Editors and affiliations

  • Frank Piessens
    • 1
  • Luca Viganò
    • 2
  1. 1.KU LeuvenLeuvenBelgium
  2. 2.King’s College LondonLondonUK

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2016
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-49634-3
  • Online ISBN 978-3-662-49635-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment