Principles of Security and Trust

6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings

  • Matteo Maffei
  • Mark Ryan
Conference proceedings POST 2017

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10204)

Also part of the Security and Cryptology book sub series (LNSC, volume 10204)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Information Flow

    1. Front Matter
      Pages 1-1
    2. Willard Rafnsson, Limin Jia, Lujo Bauer
      Pages 3-25
    3. Mário S. Alvim, Piotr Mardziel, Michael Hicks
      Pages 26-48
    4. Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld
      Pages 49-70
  3. Security Protocols

    1. Front Matter
      Pages 93-93
    2. Sergiu Bursuc, Christian Johansen, Shiwei Xu
      Pages 95-116
    3. Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse
      Pages 117-140
    4. Kushal Babel, Vincent Cheval, Steve Kremer
      Pages 141-163
    5. Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli
      Pages 164-186
  4. Security Policies

    1. Front Matter
      Pages 187-187
    2. Pablo Cañones, Boris Köpf, Jan Reineke
      Pages 189-209
    3. Zaruhi Aslanyan, Flemming Nielson
      Pages 210-231
    4. Marcos Cramer, Giovanni Casini
      Pages 232-252
    5. Ridha Khedri, Owain Jones, Mohammed Alabbad
      Pages 253-274
  5. Information Leakage

    1. Front Matter
      Pages 275-275
    2. Arthur Blot, Masaki Yamamoto, Tachio Terauchi
      Pages 277-297
  6. Back Matter
    Pages 321-321

About these proceedings


This book constitutes the proceedings of the 6th International Conference on Principles of Security and Trust, POST 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.
The 14 papers presented in this volume were carefully reviewed and selected from 40 submissions. They were organized in topical sections named: information flow; security protocols; security policies; and information leakage. 


cryptography formal methods privacy software engineernig evaluation verification model checking access control authentication user privacy security protocols

Editors and affiliations

  • Matteo Maffei
    • 1
  • Mark Ryan
    • 2
  1. 1.Saarland UniversitySaarbrückenGermany
  2. 2.University of BirminghamBirminghamUnited Kingdom

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag GmbH Germany 2017
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-662-54454-9
  • Online ISBN 978-3-662-54455-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
IT & Software
Consumer Packaged Goods
Finance, Business & Banking
Energy, Utilities & Environment