Advertisement

Principles of Security and Trust

4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings

  • Riccardo Focardi
  • Andrew Myers

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9036)

Also part of the Security and Cryptology book sub series (LNSC, volume 9036)

Table of contents

  1. Front Matter
    Pages 1-11
  2. Invited Contribution

  3. Information Flow and Security Types

    1. Front Matter
      Pages 9-9
    2. Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo
      Pages 11-31
    3. Bart van Delft, Sebastian Hunt, David Sands
      Pages 32-52
    4. Adam Petcher, Greg Morrisett
      Pages 53-72
    5. Martín Abadi, Michael Isard
      Pages 73-92
  4. Risk Assessment and Security Policies

    1. Front Matter
      Pages 93-93
    2. Zaruhi Aslanyan, Flemming Nielson
      Pages 95-114
    3. Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone
      Pages 115-134
  5. Protocols

    1. Front Matter
      Pages 135-135
    2. Tom Chothia, Ben Smyth, Chris Staite
      Pages 137-155
    3. Sjouke Mauw, Saša Radomirović
      Pages 156-175
    4. Sibylle Fröschle
      Pages 176-195
    5. Binh Thanh Nguyen, Christoph Sprenger
      Pages 196-215
  6. Hardware and Physical Security

    1. Front Matter
      Pages 217-217
    2. Robert Künnemann
      Pages 219-238
    3. Kristian Beilke, Volker Roth
      Pages 239-258
    4. Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn Talcott
      Pages 259-279
  7. Privacy and Voting

    1. Front Matter
      Pages 301-301
    2. Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling
      Pages 303-323
    3. Myrto Arapinis, Vincent Cheval, Stéphanie Delaune
      Pages 324-343
    4. Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau
      Pages 344-363
  8. Back Matter
    Pages 365-365

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and voting.

Keywords

Access Control Anonymity Authentication Availability Cloud Security Confidentiality Crypto Foundations Formal Security Models Information Flow Languages For Security Malicious Code Models and Policies Privacy Provenance Reputation and Trust Risk Assessment Security Architectures Security Protocols Trust Management Web Security

Editors and affiliations

  • Riccardo Focardi
    • 1
  • Andrew Myers
    • 2
  1. 1.Ca' Foscari UniversityVeniceItaly
  2. 2.Cornell UniversityIthacaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-662-46666-7
  • Copyright Information Springer-Verlag Berlin Heidelberg 2015
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-662-46665-0
  • Online ISBN 978-3-662-46666-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering