Principles of Security and Trust

7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings

  • Lujo Bauer
  • Ralf Küsters
Open Access
Conference proceedings
POST 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10804)

Also part of the Security and Cryptology book sub series (LNSC, volume 10804)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Information Flow and Non-intereference

    1. Front Matter
      Pages 1-1
    2. Ian Sweet, José Manuel Calderón Trilla, Chad Scherrer, Michael Hicks, Stephen Magill
      Pages 3-27 Open Access
    3. Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson
      Pages 28-52 Open Access
    4. Aleksandr Karbyshev, Kasper Svendsen, Aslan Askarov, Lars Birkedal
      Pages 53-78 Open Access
    5. Arthur Azevedo de Amorim, Cătălin Hriţcu, Benjamin C. Pierce
      Pages 79-105 Open Access
  3. Leakage, Information Flow, and Protocols

    1. Front Matter
      Pages 107-107
    2. Hamed Nemati, Christoph Baumann, Roberto Guanciale, Mads Dam
      Pages 109-133 Open Access
    3. Mário S. Alvim, Konstantinos Chatzikokolakis, Yusuke Kawamoto, Catuscia Palamidessi
      Pages 134-159 Open Access
    4. Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
      Pages 160-187 Open Access
    5. Giada Sciarretta, Roberto Carbone, Silvio Ranise, Luca Viganò
      Pages 188-213 Open Access
  4. Smart Contracts and Privacy

    1. Front Matter
      Pages 215-215
    2. Nicola Atzei, Massimo Bartoletti, Tiziana Cimoli, Stefano Lande, Roberto Zunino
      Pages 217-242 Open Access
    3. Ilya Grishchenko, Matteo Maffei, Clara Schneidewind
      Pages 243-269 Open Access
    4. Anastasia Mavridou, Aron Laszka
      Pages 270-277 Open Access
    5. Reinhard Munz, Fabienne Eigner, Matteo Maffei, Paul Francis, Deepak Garg
      Pages 278-299 Open Access
  5. Firewalls and Attack-Defense Trees

    1. Front Matter
      Pages 301-301
    2. Chiara Bodei, Pierpaolo Degano, Riccardo Focardi, Letterio Galletta, Mauro Tempesta
      Pages 303-324 Open Access
    3. Barbara Kordy, Wojciech Wideł
      Pages 325-346 Open Access
  6. Back Matter
    Pages 347-347

About these proceedings

Introduction

This book is Open Access under a CC BY licence.

Keywords

authentication computer science computer software selection and evaluation cryptography data privacy formal logic formal methods formal specification internet privacy program compilers programming languages security analysis security systems semantics separation logic software engineering specifications verification world wide web

Editors and affiliations

  • Lujo Bauer
    • 1
  • Ralf Küsters
    • 2
  1. 1.Carnegie Mellon UniversityPittsburghUSA
  2. 2.University of StuttgartStuttgartGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-89722-6
  • Copyright Information The Editor(s) (if applicable) and The Author(s) 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-89721-9
  • Online ISBN 978-3-319-89722-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book