LEADER 04608nam 22008535 450 001 9910484294703321 005 20230406045613.0 010 $a3-540-78663-5 024 7 $a10.1007/978-3-540-78663-4 035 $a(CKB)1000000000491055 035 $a(SSID)ssj0000320519 035 $a(PQKBManifestationID)11258723 035 $a(PQKBTitleCode)TC0000320519 035 $a(PQKBWorkID)10249566 035 $a(PQKB)10007401 035 $a(DE-He213)978-3-540-78663-4 035 $a(MiAaPQ)EBC4975803 035 $a(MiAaPQ)EBC5577617 035 $a(MiAaPQ)EBC6511678 035 $a(Au-PeEL)EBL4975803 035 $a(CaONFJC)MIL134319 035 $a(OCoLC)1024257826 035 $a(Au-PeEL)EBL5577617 035 $a(OCoLC)261324937 035 $a(Au-PeEL)EBL6511678 035 $a(PPN)123746027 035 $a(EXLCZ)991000000000491055 100 $a20100301d2008 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrustworthy Global Computing $eThird Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /$fedited by Gilles Barthe, Cédric Fournet 205 $a1st ed. 2008. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2008. 215 $a1 online resource (XI, 401 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4912 300 $aIncludes index. 311 $a3-540-78662-7 327 $aTrustworthy Global Computing -- Elimination of Ghost Variables in Program Logics -- Web Service Composition: From Analysis to Autonomy -- Service Combinators for Farming Virtual Machines -- Accepted Papers -- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses -- Extracting Control from Data: User Interfaces of MIDP Applications -- Extending Operational Semantics of the Java Bytecode -- Relational Analysis for Delivery of Services -- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems -- Type-Safe Distributed Programming with ML5 -- Transactional Service Level Agreement -- On the Complexity of Termination Inference for Processes -- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing -- Access Control Based on Code Identity for Open Distributed Systems -- Service Oriented Architectural Design -- Replicating Web Services for Scalability -- Location-Aware Quality of Service Measurements for Service-Level Agreements -- Multipoint Session Types for a Distributed Calculus -- On Progress for Structured Communications -- A Protocol Compiler for Secure Sessions in ML -- Application of Dependency Graphs to Security Protocol Analysis -- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols -- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus -- Tutorial Papers -- Formal Approaches to Information-Hiding (Tutorial) -- Computational Soundness of Equational Theories (Tutorial) -- Adversaries and Information Leaks (Tutorial). 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Third Symposium on Trustworthy Global Computing, TGC 2007; it also contains tutorials from the adjacent Workshop on the Interplay of Programming Languages and Cryptography. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4912 606 $aSoftware engineering 606 $aComputer networks 606 $aComputer programming 606 $aData protection 606 $aCompilers (Computer programs) 606 $aSoftware Engineering 606 $aComputer Communication Networks 606 $aProgramming Techniques 606 $aData and Information Security 606 $aCompilers and Interpreters 615 0$aSoftware engineering. 615 0$aComputer networks. 615 0$aComputer programming. 615 0$aData protection. 615 0$aCompilers (Computer programs). 615 14$aSoftware Engineering. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aData and Information Security. 615 24$aCompilers and Interpreters. 676 $a005.8 702 $aFournet$b Ce?dric 702 $aBarthe$b Gilles$f1967- 712 12$aTGC 2007 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484294703321 996 $aTrustworthy Global Computing$9771960 997 $aUNINA