Feedback

X
Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings

Principles of Security and Trust: 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Prague, Czech Republic, April 6–11, 2019, Proceedings

1 Ungluer has Faved this Work

This volume contains the papers presented at POST 2019, the 8th Conference on Principles of Security and Trust, held April 11, 2019, in Prague, Czech Republic, as part of ETAPS. Principles of Security and Trust is a broad forum related to all theoretical and foundational aspects of security and trust, and thus welcomes papers of many kinds: new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems; as well as systemization-of-knowledge papers, papers describing tools, and position papers. POST was created in 2012 to combine and replace a number of successful and long-standing workshops in this area: Automated Reasoning and Security Protocol Analysis (ARSPA), Formal Aspects of Security and Trust (FAST), Security in Concurrency (SecCo), and the Workshop on Issues in the Theory of Security (WITS). A subset of these events met jointly as an event affiliated with ETAPS 2011 under the name “Theory of Security and Applications” (TOSCA).

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 1207 times via unglue.it ebook links.
  1. 97 - pdf (CC BY) at OAPEN Library.
  2. 350 - mobi (CC BY) at Unglue.it.
  3. 368 - pdf (CC BY) at Unglue.it.
  4. 350 - epub (CC BY) at Unglue.it.

Keywords

  • Access control
  • anonymity
  • artificial intelligence
  • authentication
  • Computer programming / software development
  • Computer science
  • Computer security
  • Computer system failures
  • Computers
  • Computing & information technology
  • crypto foundations
  • data security
  • formal logic
  • formal methods
  • formal verifications
  • Information technology: general issues
  • Model Checking
  • privacy
  • program compilers
  • Programming languages
  • reputation and trust
  • Semantics
  • Software engineering
  • software evaluation
  • Systems analysis & design
  • trust management
  • Verification

Links

DOI: 10.1007/978-3-030-17138-4
web: https://link.springer.com/book/10.1007/978-3-030-17138-4

Editions

edition cover
edition cover

Share

Copy/paste this into your site: