Keywords:
Computer science
;
Computer system failures
;
Computer security
;
Data structures (Computer science)
;
Computers
;
Computer Science
;
Systems and Data Security
;
Theory of Computation
;
Computing Milieux
;
Data Structures, Cryptology and Information Theory
;
System Performance and Evaluation
Description / Table of Contents:
Information Flow and Non-Intereference --- What's the Over/Under? Probabilistic Bounds on Information Leakage --- Secure Information Release in Timed Automata --- Compositional Non-Interference for Concurrent Programs via Separation and Framing --- The Meaning of Memory Safety --- Leakage, Information Flow, and Protocols --- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage --- Leakage and Protocol Composition in a Game-theoretic Perspective --- Equivalence Properties by Typing in Cryptographic Branching Protocols --- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience --- Smart Contracts and Privacy --- SoK: Unraveling Bitcoin Smart Contracts --- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts --- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts --- UniTraX: Protecting Data Privacy with Discoverable Biases --- Firewalls and Attack-Defense Trees --- Transcompiling Firewalls --- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels
Pages:
Online-Ressource (XIV, 347 pages)
,
85 illustrations
ISBN:
9783319897226
URL:
https://link.springer.com/openurl?genre=book&isbn=978-3-319-89722-6
Language:
English
Permalink