04608nam 22008535 450 991048429470332120230406045613.03-540-78663-510.1007/978-3-540-78663-4(CKB)1000000000491055(SSID)ssj0000320519(PQKBManifestationID)11258723(PQKBTitleCode)TC0000320519(PQKBWorkID)10249566(PQKB)10007401(DE-He213)978-3-540-78663-4(MiAaPQ)EBC4975803(MiAaPQ)EBC5577617(MiAaPQ)EBC6511678(Au-PeEL)EBL4975803(CaONFJC)MIL134319(OCoLC)1024257826(Au-PeEL)EBL5577617(OCoLC)261324937(Au-PeEL)EBL6511678(PPN)123746027(EXLCZ)99100000000049105520100301d2008 u| 0engurnn#008mamaatxtccrTrustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /edited by Gilles Barthe, Cédric Fournet1st ed. 2008.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2008.1 online resource (XI, 401 p.)Theoretical Computer Science and General Issues,2512-2029 ;4912Includes index.3-540-78662-7 Trustworthy Global Computing -- Elimination of Ghost Variables in Program Logics -- Web Service Composition: From Analysis to Autonomy -- Service Combinators for Farming Virtual Machines -- Accepted Papers -- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses -- Extracting Control from Data: User Interfaces of MIDP Applications -- Extending Operational Semantics of the Java Bytecode -- Relational Analysis for Delivery of Services -- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems -- Type-Safe Distributed Programming with ML5 -- Transactional Service Level Agreement -- On the Complexity of Termination Inference for Processes -- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing -- Access Control Based on Code Identity for Open Distributed Systems -- Service Oriented Architectural Design -- Replicating Web Services for Scalability -- Location-Aware Quality of Service Measurements for Service-Level Agreements -- Multipoint Session Types for a Distributed Calculus -- On Progress for Structured Communications -- A Protocol Compiler for Secure Sessions in ML -- Application of Dependency Graphs to Security Protocol Analysis -- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols -- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus -- Tutorial Papers -- Formal Approaches to Information-Hiding (Tutorial) -- Computational Soundness of Equational Theories (Tutorial) -- Adversaries and Information Leaks (Tutorial).This book constitutes the thoroughly refereed post-conference proceedings of the Third Symposium on Trustworthy Global Computing, TGC 2007; it also contains tutorials from the adjacent Workshop on the Interplay of Programming Languages and Cryptography.Theoretical Computer Science and General Issues,2512-2029 ;4912Software engineeringComputer networksComputer programmingData protectionCompilers (Computer programs)Software EngineeringComputer Communication NetworksProgramming TechniquesData and Information SecurityCompilers and InterpretersSoftware engineering.Computer networks.Computer programming.Data protection.Compilers (Computer programs).Software Engineering.Computer Communication Networks.Programming Techniques.Data and Information Security.Compilers and Interpreters.005.8Fournet CédricBarthe Gilles1967-TGC 2007MiAaPQMiAaPQMiAaPQBOOK9910484294703321Trustworthy Global Computing771960UNINA