Skip to main content
  • Conference proceedings
  • © 2016

Principles of Security and Trust

5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9635)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): POST: International Conference on Principles of Security and Trust

Conference proceedings info: POST 2016.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (13 papers)

  1. Front Matter

    Pages I-X
  2. Information Flow

    1. Front Matter

      Pages 1-1
    2. Faceted Dynamic Information Flow via Control and Data Monads

      • Thomas Schmitz, Dustin Rhodes, Thomas H. Austin, Kenneth Knowles, Cormac Flanagan
      Pages 3-23
    3. Asymmetric Secure Multi-execution with Declassification

      • Iulia Boloşteanu, Deepak Garg
      Pages 24-45
    4. A Taxonomy of Information Flow Monitors

      • Nataliia Bielova, Tamara Rezk
      Pages 46-67
    5. On Improvements of Low-Deterministic Security

      • Joachim Breitner, Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting
      Pages 68-88
    6. Tool Demonstration: JOANA

      • Jürgen Graf, Martin Hecker, Martin Mohr, Gregor Snelting
      Pages 89-93
  3. Models and Applications

    1. Front Matter

      Pages 95-95
    2. Correct Audit Logging: Theory and Practice

      • Sepehr Amir-Mohammadian, Stephen Chong, Christian Skalka
      Pages 139-162
    3. The Value of Attack-Defence Diagrams

      • Holger Hermanns, Julia Krämer, Jan Krčál, Mariëlle Stoelinga
      Pages 163-185
  4. Protocols

    1. Front Matter

      Pages 187-187
    2. Composing Protocols with Randomized Actions

      • Matthew S. Bauer, Rohit Chadha, Mahesh Viswanathan
      Pages 189-210
    3. Bounding the Number of Agents, for Equivalence Too

      • Véronique Cortier, Antoine Dallon, Stéphanie Delaune
      Pages 211-232
    4. AIF-\(\omega \): Set-Based Protocol Abstraction with Countable Families

      • Sebastian Mödersheim, Alessandro Bruni
      Pages 233-253
    5. Computational Soundness Results for Stateful Applied \(\pi \) Calculus

      • Jianxiong Shao, Yu Qin, Dengguo Feng
      Pages 254-275
  5. Back Matter

    Pages 277-277

Other Volumes

  1. Principles of Security and Trust

About this book

This book constitutes the proceedings of the 5th International Conference on Principles of Security and Trust, POST 2016, which took place in Eindhoven, The Netherlands, in April 2016, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016.

The 12 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: information flow; models and applications; protocols.   

Editors and Affiliations

  • KU Leuven, Leuven, Belgium

    Frank Piessens

  • King’s College London, London, UK

    Luca Viganò

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access