Skip to main content
  • Conference proceedings
  • © 2014

Principles of Security and Trust

Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8414)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): POST: International Conference on Principles of Security and Trust

Conference proceedings info: POST 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (16 papers)

  1. Front Matter

  2. Analysis of Cryptographic Protocols

    1. A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems

      • David Baelde, Stéphanie Delaune, Lucca Hirschi
      Pages 1-21
    2. Stateful Applied Pi Calculus

      • Myrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan
      Pages 22-41
    3. Computational Soundness Results for ProVerif

      • Michael Backes, Esfandiar Mohammadi, Tim Ruffing
      Pages 42-62
    4. A Secure Key Management Interface with Asymmetric Cryptography

      • Marion Daubignard, David Lubicz, Graham Steel
      Pages 63-82
  3. Quantitative Aspects of Information Flow

    1. Abstract Channels and Their Robust Information-Leakage Ordering

      • Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza, Larissa Meinicke
      Pages 83-102
    2. Quantitative Information Flow in Boolean Programs

      • Rohit Chadha, Dileep Kini, Mahesh Viswanathan
      Pages 103-119
    3. When Not All Bits Are Equal: Worth-Based Information Flow

      • Mário S. Alvim, Andre Scedrov, Fred B. Schneider
      Pages 120-139
    4. Leakage Resilience against Concurrent Cache Attacks

      • Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa
      Pages 140-158
  4. Information Flow Control in Programming Languages

    1. Information Flow Control in WebKit’s JavaScript Bytecode

      • Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
      Pages 159-178
    2. Defining and Enforcing Referential Security

      • Jed Liu, Andrew C. Myers
      Pages 199-219
  5. Cryptography in Implementations

    1. Extending and Applying a Framework for the Cryptographic Verification of Java Programs

      • Ralf Küsters, Enrico Scapin, Tomasz Truderung, Jürgen Graf
      Pages 220-239
    2. Compiling CAO: From Cryptographic Specifications to C Implementations

      • Manuel Barbosa, David Castro, Paulo F. Silva
      Pages 240-244
  6. Policies and Attacks

    1. Decentralized Composite Access Control

      • Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David Basin
      Pages 245-264
    2. Temporal Logics for Hyperproperties

      • Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez
      Pages 265-284
    3. Time-Dependent Analysis of Attacks

      • Florian Arnold, Holger Hermanns, Reza Pulungan, Mariëlle Stoelinga
      Pages 285-305
  7. Back Matter

Other Volumes

  1. Principles of Security and Trust

About this book

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Editors and Affiliations

  • Microsoft Research, Mountain View, USA

    Martín Abadi

  • LORIA, Vandoevre-lès-Nancy Cedex, France

    Steve Kremer

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access