|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465654603316 |
|
|
Titolo |
Trustworthy Global Computing [[electronic resource] ] : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers / / edited by Gilles Barthe, Cédric Fournet |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2008.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XI, 401 p.) |
|
|
|
|
|
|
Collana |
|
Theoretical Computer Science and General Issues, , 2512-2029 ; ; 4912 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Software engineering |
Computer networks |
Computer programming |
Data protection |
Compilers (Computer programs) |
Software Engineering |
Computer Communication Networks |
Programming Techniques |
Data and Information Security |
Compilers and Interpreters |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Trustworthy Global Computing -- Elimination of Ghost Variables in Program Logics -- Web Service Composition: From Analysis to Autonomy -- Service Combinators for Farming Virtual Machines -- Accepted Papers -- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses -- Extracting Control from Data: User Interfaces of MIDP Applications -- Extending Operational Semantics of the Java Bytecode -- Relational Analysis for Delivery of Services -- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems -- Type-Safe Distributed Programming with ML5 -- Transactional Service Level Agreement -- On the Complexity of Termination Inference for Processes -- A Practical Approach for Establishing Trust Relationships |
|
|
|
|
|
|
|
|
|
|
|
between Remote Platforms Using Trusted Computing -- Access Control Based on Code Identity for Open Distributed Systems -- Service Oriented Architectural Design -- Replicating Web Services for Scalability -- Location-Aware Quality of Service Measurements for Service-Level Agreements -- Multipoint Session Types for a Distributed Calculus -- On Progress for Structured Communications -- A Protocol Compiler for Secure Sessions in ML -- Application of Dependency Graphs to Security Protocol Analysis -- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols -- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus -- Tutorial Papers -- Formal Approaches to Information-Hiding (Tutorial) -- Computational Soundness of Equational Theories (Tutorial) -- Adversaries and Information Leaks (Tutorial). |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-conference proceedings of the Third Symposium on Trustworthy Global Computing, TGC 2007; it also contains tutorials from the adjacent Workshop on the Interplay of Programming Languages and Cryptography. |
|
|
|
|
|
|
|
| |