語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Principles of security and trust = 4...
~
Focardi, Riccardo.
FindBook
Google Book
Amazon
博客來
Principles of security and trust = 4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Principles of security and trust/ edited by Riccardo Focardi, Andrew Myers.
其他題名:
4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
其他題名:
POST 2015
其他作者:
Focardi, Riccardo.
出版者:
Berlin, Heidelberg :Springer Berlin Heidelberg : : 2015.,
面頁冊數:
xii, 365 p. :ill., digital ;24 cm.
內容註:
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges -- IFC Inside: Retrofitting Languages with Dynamic Information Flow Control -- Very Static Enforcement of Dynamic Policies -- The Foundational Cryptography Framework -- On the Flow of Data, Information, and Time -- Pareto Efficient Solutions of Attack-Defence Trees -- Analysis of XACML Policies with SMT -- Automatically Checking Commitment Protocols in ProVerif without False Attacks -- Generalizing Multi-party Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol Verification -- Automated Backward Analysis of PKCS#11 v2.20 -- A Safe Update Mechanism for Smart Cards -- Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols -- Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques -- Type-Based Verification of Electronic Voting Protocols -- Composing Security Protocols: From Confidentiality to Privacy -- PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law.
Contained By:
Springer eBooks
標題:
Computer security - Fiction. -
電子資源:
http://dx.doi.org/10.1007/978-3-662-46666-7
ISBN:
9783662466667 (electronic bk.)
Principles of security and trust = 4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
Principles of security and trust
4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /[electronic resource] :POST 2015edited by Riccardo Focardi, Andrew Myers. - Berlin, Heidelberg :Springer Berlin Heidelberg :2015. - xii, 365 p. :ill., digital ;24 cm. - Lecture notes in computer science,90360302-9743 ;. - Lecture notes in computer science ;5353..
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges -- IFC Inside: Retrofitting Languages with Dynamic Information Flow Control -- Very Static Enforcement of Dynamic Policies -- The Foundational Cryptography Framework -- On the Flow of Data, Information, and Time -- Pareto Efficient Solutions of Attack-Defence Trees -- Analysis of XACML Policies with SMT -- Automatically Checking Commitment Protocols in ProVerif without False Attacks -- Generalizing Multi-party Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol Verification -- Automated Backward Analysis of PKCS#11 v2.20 -- A Safe Update Mechanism for Smart Cards -- Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols -- Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques -- Type-Based Verification of Electronic Voting Protocols -- Composing Security Protocols: From Confidentiality to Privacy -- PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law.
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and voting.
ISBN: 9783662466667 (electronic bk.)
Standard No.: 10.1007/978-3-662-46666-7doiSubjects--Topical Terms:
1235111
Computer security
--Fiction.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Principles of security and trust = 4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
LDR
:02947nmm a2200349 a 4500
001
1997857
003
DE-He213
005
20151023135128.0
006
m d
007
cr nn 008maaau
008
151112s2015 gw s 0 eng d
020
$a
9783662466667 (electronic bk.)
020
$a
9783662466650 (paper)
024
7
$a
10.1007/978-3-662-46666-7
$2
doi
035
$a
978-3-662-46666-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
P857 2015
245
1 0
$a
Principles of security and trust
$h
[electronic resource] :
$b
4th International Conference, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015 : proceedings /
$c
edited by Riccardo Focardi, Andrew Myers.
246
3
$a
POST 2015
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2015.
300
$a
xii, 365 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9036
505
0
$a
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges -- IFC Inside: Retrofitting Languages with Dynamic Information Flow Control -- Very Static Enforcement of Dynamic Policies -- The Foundational Cryptography Framework -- On the Flow of Data, Information, and Time -- Pareto Efficient Solutions of Attack-Defence Trees -- Analysis of XACML Policies with SMT -- Automatically Checking Commitment Protocols in ProVerif without False Attacks -- Generalizing Multi-party Contract Signing -- Leakiness is Decidable for Well-Founded Protocols -- Abstractions for Security Protocol Verification -- Automated Backward Analysis of PKCS#11 v2.20 -- A Safe Update Mechanism for Smart Cards -- Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols -- Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques -- Type-Based Verification of Electronic Voting Protocols -- Composing Security Protocols: From Confidentiality to Privacy -- PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law.
520
$a
This book constitutes the refereed proceedings of the 4th International Conference on Principles of Security and Trust, POST 2015, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, in London, UK, in April 2015. The 17 regular papers presented in this volume were carefully reviewed and selected from 57 submissions. In addition, one invited talk is included. The papers have been organized in topical sections on information flow and security types, risk assessment and security policies, protocols, hardware and physical security and privacy and voting.
650
0
$a
Computer security
$v
Fiction.
$3
1235111
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Management of Computing and Information Systems.
$3
892490
650
2 4
$a
Computers and Society.
$3
891253
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
891007
700
1
$a
Focardi, Riccardo.
$3
1072175
700
1
$a
Myers, Andrew.
$3
1068273
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
5353.
$x
0302-9743
$3
1274248
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-46666-7
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9268568
電子資源
01.外借(書)_YB
電子書
EB QA76.9.A25 P857 2015
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入