LEADER 05870nam 22008655 450 001 996465907903316 005 20230222032126.0 010 $a1-280-38883-8 010 $a9786613566751 010 $a3-642-15640-1 024 7 $a10.1007/978-3-642-15640-3 035 $a(CKB)2670000000045081 035 $a(SSID)ssj0000446855 035 $a(PQKBManifestationID)11291513 035 $a(PQKBTitleCode)TC0000446855 035 $a(PQKBWorkID)10504530 035 $a(PQKB)11113927 035 $a(DE-He213)978-3-642-15640-3 035 $a(MiAaPQ)EBC3065829 035 $a(PPN)149024495 035 $a(EXLCZ)992670000000045081 100 $a20100915d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrustworthy Global Computing$b[electronic resource] $e5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers /$fedited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XII, 380 p. 72 illus.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v6084 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-15639-8 320 $aIncludes bibliographical references and author index. 327 $aInvited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services. 330 $aGlobal computing refers to computation over ?global computers,? i.e., com- tational infrastructures available globally and able to provide uniform services with variable guarantees for communication, cooperation and mobility, resource usage, security policies and mechanisms, etc., with particular regard to explo- ing their universal scale and the programmability of their services. As the scope and computational power of such global infrastructures continue to grow, it - comes more and more important to develop methods, theories and techniques for trustworthy systems running on global computers. This book constitutes the thoroughly refereed proceedings of the ?fth e- tion of the International Symposium on Trustworthy Global Computing (TGC 2010)thatwasheldinMunich,Germany,February24-26,2010.TheSymposium on Trustworthy Global Computing is an international annual venue dedicated to safe and reliable computation in global computers. It focuses on providing frameworks, tools, and protocols for constructing well-behaved applications and on reasoning rigorouslyabout their behavior and properties. The related models of computation incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v6084 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aElectronic data processing?Management 606 $aAlgorithms 606 $aSoftware engineering 606 $aCoding theory 606 $aInformation theory 606 $aCryptology 606 $aComputer Communication Networks 606 $aIT Operations 606 $aAlgorithms 606 $aSoftware Engineering 606 $aCoding and Information Theory 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer networks. 615 0$aElectronic data processing?Management. 615 0$aAlgorithms. 615 0$aSoftware engineering. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aSoftware Engineering. 615 24$aCoding and Information Theory. 676 $a005.8 702 $aWirsing$b Martin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHofmann$b Martin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRauschmayer$b Axel$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aTGC 2010 906 $aBOOK 912 $a996465907903316 996 $aTrustworthy Global Computing$9771960 997 $aUNISA