Cantitate/Preț
Produs

Principles of Security and Trust: 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings: Lecture Notes in Computer Science, cartea 9635

Editat de Frank Piessens, Luca Viganò
en Limba Engleză Paperback – 22 mar 2016
This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016.

The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols.   
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 33206 lei

Preț vechi: 41508 lei
-20% Nou

Puncte Express: 498

Preț estimativ în valută:
6355 6609$ 5318£

Carte tipărită la comandă

Livrare economică 15-29 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662496343
ISBN-10: 3662496348
Pagini: 277
Ilustrații: X, 277 p. 69 illus. in color.
Dimensiuni: 155 x 235 x 15 mm
Greutate: 0.41 kg
Ediția:1st ed. 2016
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Cuprins

Information Flow.- Faceted Dynamic Information Flow via Control and Data Monads.- Asymmetric Secure Multi-execution with Declassification.- A Taxonomy of Information Flow Monitors.- On Improvements of Low-Deterministic Security.- Tool Demonstration: JOANA.- Models and Applications.- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study.- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels.- Correct Audit Logging: Theory and Practice.- The Value of Attack-Defence Diagrams.- Protocols.- Composing protocols with randomized actions.- Bounding the number of agents, for equivalence too.- AIF-omega: Set-Based Protocol Abstraction with Countable Families.- Computational Soundness Results for Stateful Applied pi Calculus.   

Caracteristici

Includes supplementary material: sn.pub/extras