Explore
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings
This volume contains the papers presented at POST 2019, the 8th Conference on Principles of Security and Trust, held April 11, 2019, in Prague, Czech Republic, as part of ETAPS. Principles of Security and Trust is a broad forum related to all theoretical and foundational aspects of security and trust, and thus welcomes papers of many kinds: new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems; as well as systemization-of-knowledge papers, papers describing tools, and position papers. POST was created in 2012 to combine and replace a number of successful and long-standing workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name “Theory of Security and Applications” (TOSCA).
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
- 119 - pdf (CC BY) at OAPEN Library.
- 374 - mobi (CC BY) at Unglue.it.
- 387 - pdf (CC BY) at Unglue.it.
- 363 - epub (CC BY) at Unglue.it.
Keywords
- Access control
- anonymity
- artificial intelligence
- authentication
- Computer programming / software development
- Computer science
- Computer security
- Computer system failures
- Computers
- Computing & information technology
- crypto foundations
- data security
- formal logic
- formal methods
- formal verifications
- Information technology: general issues
- Model Checking
- privacy
- program compilers
- Programming languages
- reputation and trust
- Semantics
- Software engineering
- software evaluation
- Systems analysis & design
- thema EDItEUR::U Computing and Information Technology::UB Information technology: general topics
- thema EDItEUR::U Computing and Information Technology::UM Computer programming / software engineering::UMZ Software Engineering
- thema EDItEUR::U Computing and Information Technology::UR Computer security
- thema EDItEUR::U Computing and Information Technology::UY Computer science
- thema EDItEUR::U Computing and Information Technology::UY Computer science::UYD Systems analysis and design
- thema EDItEUR::U Computing and Information Technology::UY Computer science::UYQ Artificial intelligence
- trust management
- Verification
Links
DOI: 10.1007/978-3-030-17138-4web: https://link.springer.com/book/10.1007/978-3-030-17138-4