default search action
4th POST 2015: London, UK (Part of ETAPS 2015)
- Riccardo Focardi, Andrew C. Myers:
Principles of Security and Trust - 4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings. Lecture Notes in Computer Science 9036, Springer 2015, ISBN 978-3-662-46665-0
Invited Contribution
- Catuscia Palamidessi:
Quantitative Approaches to the Protection of Private Information: State of the Art and Some Open Challenges. 3-7
Information Flow and Security Types
- Stefan Heule, Deian Stefan, Edward Z. Yang, John C. Mitchell, Alejandro Russo:
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control. 11-31 - Bart van Delft, Sebastian Hunt, David Sands:
Very Static Enforcement of Dynamic Policies. 32-52 - Adam Petcher, Greg Morrisett:
The Foundational Cryptography Framework. 53-72 - Martín Abadi, Michael Isard:
On the Flow of Data, Information, and Time. 73-92
Risk Assessment and Security Policies
- Zaruhi Aslanyan, Flemming Nielson:
Pareto Efficient Solutions of Attack-Defence Trees. 95-114 - Fatih Turkmen, Jerry den Hartog, Silvio Ranise, Nicola Zannone:
Analysis of XACML Policies with SMT. 115-134
Protocols
- Tom Chothia, Ben Smyth, Christopher Staite:
Automatically Checking Commitment Protocols in ProVerif without False Attacks. 137-155 - Sjouke Mauw, Sasa Radomirovic:
Generalizing Multi-party Contract Signing. 156-175 - Sibylle B. Fröschle:
Leakiness is Decidable for Well-Founded Protocols. 176-195 - Thanh Binh Nguyen, Christoph Sprenger:
Abstractions for Security Protocol Verification. 196-215
Hardware and Physical Security
- Robert Künnemann:
Automated Backward Analysis of PKCS#11 v2.20. 219-238 - Kristian Beilke, Volker Roth:
A Safe Update Mechanism for Smart Cards. 239-258 - Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols. 259-279 - Vincent Cheval, Véronique Cortier:
Timing Attacks in Security Protocols: Symbolic Framework and Proof Techniques. 280-299
Privacy and Voting
- Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:
Type-Based Verification of Electronic Voting Protocols. 303-323 - Myrto Arapinis, Vincent Cheval, Stéphanie Delaune:
Composing Security Protocols: From Confidentiality to Privacy. 324-343 - Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau:
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. 344-363
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.