|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-49635-0 |
003 |
DE-He213 |
005 |
20220115075833.0 |
007 |
cr nn 008mamaa |
008 |
160330s2016 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662496350
|9 978-3-662-49635-0
|
024 |
7 |
|
|a 10.1007/978-3-662-49635-0
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Principles of Security and Trust
|h [electronic resource] :
|b 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings /
|c edited by Frank Piessens, Luca Viganò.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 277 p. 69 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9635
|
505 |
0 |
|
|a Information Flow -- Faceted Dynamic Information Flow via Control and Data Monads -- Asymmetric Secure Multi-execution with Declassification -- A Taxonomy of Information Flow Monitors -- On Improvements of Low-Deterministic Security -- Tool Demonstration: JOANA -- Models and Applications -- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study -- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels -- Correct Audit Logging: Theory and Practice -- The Value of Attack-Defence Diagrams -- Protocols -- Composing protocols with randomized actions -- Bounding the number of agents, for equivalence too -- AIF-omega: Set-Based Protocol Abstraction with Countable Families -- Computational Soundness Results for Stateful Applied pi Calculus. .
|
520 |
|
|
|a This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016. The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Algorithms.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a IT Operations.
|
650 |
2 |
4 |
|a Computers and Society.
|
650 |
2 |
4 |
|a Algorithms.
|
700 |
1 |
|
|a Piessens, Frank.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Viganò, Luca.
|e editor.
|0 (orcid)0000-0001-9916-271X
|1 https://orcid.org/0000-0001-9916-271X
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662496343
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662496367
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9635
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-49635-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|