- Kushal Babel, Vincent Cheval, Steve Kremer:
On Communication Models When Verifying Equivalence Properties. POST 2017: 141-163 - Arthur Blot, Masaki Yamamoto, Tachio Terauchi:
Compositional Synthesis of Leakage Resilient Programs. POST 2017: 277-297 - Sergiu Bursuc, Christian Johansen, Shiwei Xu:
Automated Verification of Dynamic Root of Trust Protocols. POST 2017: 95-116 - Pablo Cañones, Boris Köpf, Jan Reineke:
Security Analysis of Cache Replacement Policies. POST 2017: 189-209 - Marcos Cramer, Giovanni Casini:
Postulates for Revocation Schemes. POST 2017: 232-252 - Jannik Dreier, Charles Duménil, Steve Kremer, Ralf Sasse:
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols. POST 2017: 117-140 - Daniel Hedin, Alexander Sjösten, Frank Piessens, Andrei Sabelfeld:
A Principled Approach to Tracking Information Flow in the Presence of Libraries. POST 2017: 49-70 - Ridha Khédri, Owain Jones, Mohammed Alabbad:
Defense in Depth Formulation and Usage in Dynamic Access Control. POST 2017: 253-274 - Martin Pettai, Peeter Laud:
Combining Differential Privacy and Mutual Information for Analyzing Leakages in Workflows. POST 2017: 298-319 - Willard Rafnsson, Limin Jia, Lujo Bauer:
Timing-Sensitive Noninterference through Composition. POST 2017: 3-25 - Matteo Maffei, Mark Ryan:
Principles of Security and Trust - 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings. Lecture Notes in Computer Science 10204, Springer 2017, ISBN 978-3-662-54454-9 [contents] - 2016
- Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka:
Correct Audit Logging: Theory and Practice. POST 2016: 139-162 - Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan:
Composing Protocols with Randomized Actions. POST 2016: 189-210 - Nataliia Bielova, Tamara Rezk:
A Taxonomy of Information Flow Monitors. POST 2016: 46-67 - Iulia Bolosteanu, Deepak Garg:
Asymmetric Secure Multi-execution with Declassification. POST 2016: 24-45 - Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting:
On Improvements of Low-Deterministic Security. POST 2016: 68-88 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:
Bounding the Number of Agents, for Equivalence Too. POST 2016: 211-232 - Quoc Huy Do, Eduard Kamburjan, Nathan Wasser:
Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study. POST 2016: 97-115 - Kevin Falzon, Eric Bodden:
Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels. POST 2016: 116-138 - Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting:
Tool Demonstration: JOANA. POST 2016: 89-93 - Holger Hermanns, Julia Krämer, Jan Krcál, Mariëlle Stoelinga:
The Value of Attack-Defence Diagrams. POST 2016: 163-185 - Sebastian Mödersheim, Alessandro Bruni:
AIF-ω: Set-Based Protocol Abstraction with Countable Families. POST 2016: 233-253 - Thomas Schmitz, Dustin Rhodes, Thomas H. Austin, Kenneth L. Knowles, Cormac Flanagan:
Faceted Dynamic Information Flow via Control and Data Monads. POST 2016: 3-23 - Jianxiong Shao, Yu Qin, Dengguo Feng:
Computational Soundness Results for Stateful Applied π Calculus. POST 2016: 254-275 - Frank Piessens, Luca Viganò:
Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings. Lecture Notes in Computer Science 9635, Springer 2016, ISBN 978-3-662-49634-3 [contents] - 2015
- Michael Backes, Fabian Bendun, Jörg Hoffmann, Ninja Marnau:
PriCL: Creating a Precedent, a Framework for Reasoning about Privacy Case Law. POST 2015: 344-363 - Thanh Binh Nguyen, Christoph Sprenger:
Abstractions for Security Protocol Verification. POST 2015: 196-215 - Martín Abadi, Michael Isard:
On the Flow of Data, Information, and Time. POST 2015: 73-92 - Myrto Arapinis, Vincent Cheval, Stéphanie Delaune:
Composing Security Protocols: From Confidentiality to Privacy. POST 2015: 324-343 - Zaruhi Aslanyan, Flemming Nielson:
Pareto Efficient Solutions of Attack-Defence Trees. POST 2015: 95-114