LEADER 03856nam 22007335 450 001 9910483259603321 005 20251226203721.0 010 $a3-662-45917-5 024 7 $a10.1007/978-3-662-45917-1 035 $a(CKB)3710000000325120 035 $a(SSID)ssj0001408437 035 $a(PQKBManifestationID)11967328 035 $a(PQKBTitleCode)TC0001408437 035 $a(PQKBWorkID)11346670 035 $a(PQKB)10492974 035 $a(DE-He213)978-3-662-45917-1 035 $a(MiAaPQ)EBC5577899 035 $a(PPN)183152433 035 $a(EXLCZ)993710000000325120 100 $a20141222d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrustworthy Global Computing $e9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers /$fedited by Matteo Maffei, Emilio Tuosto 205 $a1st ed. 2014. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2014. 215 $a1 online resource (XV, 193 p. 50 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v8902 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-662-45916-7 320 $aIncludes bibliographical references and index. 327 $aGeneralized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM ? Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing  focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v8902 606 $aData protection 606 $aMachine theory 606 $aApplication software 606 $aComputer engineering 606 $aComputer networks 606 $aData and Information Security 606 $aFormal Languages and Automata Theory 606 $aComputer and Information Systems Applications 606 $aComputer Engineering and Networks 615 0$aData protection. 615 0$aMachine theory. 615 0$aApplication software. 615 0$aComputer engineering. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aFormal Languages and Automata Theory. 615 24$aComputer and Information Systems Applications. 615 24$aComputer Engineering and Networks. 676 $a005.8 702 $aMaffei$b Matteo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTuosto$b Emilio$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483259603321 996 $aTrustworthy Global Computing$9771960 997 $aUNINA