did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642286407

Principles of Security and Trust : First International Conference, POST 2012, Held As Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings

by ;
  • ISBN13:

    9783642286407

  • ISBN10:

    3642286402

  • Format: Paperback
  • Copyright: 2012-05-04
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $99.00 Save up to $80.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the first International Conference on Principles of Security and Trust, POST 2012, held in Tallinn, Estonia, in March/April 2012, as part of ETAPS 2012, the European Joint Conferences on Theory and Practice of Software.The 20 papers, presented together with the abstract of an invited talk and a joint-ETAPS paper, were selected from a total of 67 submissions. Topics covered by the papers include: foundations of security, authentication, confidentiality, privacy and anonymity, authorization and trust, network security, protocols for security, language-based security, and quantitative security properties.

Table of Contents

Differential Privacy and the Power of (Formalizing) Negative Thinking (Extended Abstract)p. 1
Security Protocol Verification: Symbolic and Computational Modelsp. 3
Analysing Routing Protocols: Four Nodes Topologies Are Sufficientp. 30
Parametric Verification of Address Space Separationp. 51
Verification of Security Protocols with Lists: From Length One to Unbounded Lengthp. 69
Privacy Supporting Cloud Computing: ConfiChair, a Case Studyp. 89
A Formal Analysis of the Norwegian E-voting Protocolp. 109
Provably Repairing the ISO/TEC 9798 Standard for Entity Authenticationp. 129
Security Proof with Dishonest Keysp. 149
Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativityp. 169
Towards Unconditional Soundness: Computationally Complete Symbolic Attackerp. 189
Verified Indifferentiable Hashing into Elliptic Curvesp. 209
Provable De-anonymization of Large Datasets with Sparse Dimensionsp. 229
Revisiting Botnet Models and Their Implications for Takedown Strategiesp. 249
A Game-Theoretic Analysis of Cooperation in Anonymity Networksp. 269
Deciding Selective Declassification of Petri Netsp. 290
Enforceable Security Policies Revisitedp. 309
Towards Incrementalization of Holistic Hyperpropertiesp. 329
Type-Based Analysis of PKCS#11 Key Managementp. 349
A Certificate Infrastructure for Machine-Checked Proofs of Conditional Information Flowp. 369
PTaCL: A Language for Attribute-Based Access Control in Open Systemsp. 390
A Core Calculus for Provenancep. 410
Author Indexp. 431
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program