Principles of Security and Trust

Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings

  • Martín Abadi
  • Steve Kremer
Conference proceedings POST 2014

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8414)

Table of contents

  1. Front Matter
  2. Analysis of Cryptographic Protocols

    1. David Baelde, Stéphanie Delaune, Lucca Hirschi
      Pages 1-21
    2. Myrto Arapinis, Jia Liu, Eike Ritter, Mark Ryan
      Pages 22-41
    3. Michael Backes, Esfandiar Mohammadi, Tim Ruffing
      Pages 42-62
    4. Marion Daubignard, David Lubicz, Graham Steel
      Pages 63-82
  3. Quantitative Aspects of Information Flow

    1. Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza, Larissa Meinicke
      Pages 83-102
    2. Rohit Chadha, Dileep Kini, Mahesh Viswanathan
      Pages 103-119
    3. Mário S. Alvim, Andre Scedrov, Fred B. Schneider
      Pages 120-139
    4. Gilles Barthe, Boris Köpf, Laurent Mauborgne, Martín Ochoa
      Pages 140-158
  4. Information Flow Control in Programming Languages

    1. Abhishek Bichhawat, Vineet Rajani, Deepak Garg, Christian Hammer
      Pages 159-178
    2. Jed Liu, Andrew C. Myers
      Pages 199-219
  5. Cryptography in Implementations

    1. Ralf Küsters, Enrico Scapin, Tomasz Truderung, Jürgen Graf
      Pages 220-239
    2. Manuel Barbosa, David Castro, Paulo F. Silva
      Pages 240-244
  6. Policies and Attacks

    1. Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David Basin
      Pages 245-264
    2. Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez
      Pages 265-284
    3. Florian Arnold, Holger Hermanns, Reza Pulungan, Mariëlle Stoelinga
      Pages 285-305
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Keywords

Web security authentication cloud computing cryptanalysis and other attacks cryptographic protocols encryption formal verification privacy reputation and trust security protocols

Editors and affiliations

  • Martín Abadi
    • 1
  • Steve Kremer
    • 2
  1. 1.Microsoft ResearchMountain ViewUSA
  2. 2.LORIAVandoevre-lès-Nancy CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-54792-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2014
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-54791-1
  • Online ISBN 978-3-642-54792-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book