top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CONCUR 2005 - Concurrency Theory [[electronic resource] ] : 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings / / edited by Martín Abadi, Luca de Alfaro
CONCUR 2005 - Concurrency Theory [[electronic resource] ] : 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings / / edited by Martín Abadi, Luca de Alfaro
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XXIV, 1280 p.)
Disciplina 004/.35
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer systems
Computer science
Compilers (Computer programs)
Computer programming
Computer System Implementation
Theory of Computation
Computer Science Logic and Foundations of Programming
Compilers and Interpreters
Programming Techniques
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lectures -- Static Analysis Versus Model Checking for Bug Finding -- The Benefits of Exposing Calls and Returns -- A Compositional Approach to the Stochastic Dynamics of Gene Networks -- Contributed Papers -- Games Other People Play -- Type-Directed Concurrency -- Multiport Interaction Nets and Concurrency -- Model Checking for ?-Calculus Using Proof Search -- A Game Semantics of the Asynchronous ?-Calculus -- Efficient On-the-Fly Algorithms for the Analysis of Timed Games -- Modal Logics for Timed Control -- Timed Shuffle Expressions -- A New Modality for Almost Everywhere Properties in Timed Automata -- The Coarsest Congruence for Timed Automata with Deadlines Contained in Bisimulation -- A Behavioural Pseudometric for Metric Labelled Transition Systems -- On Probabilistic Program Equivalence and Refinement -- Probabilistic Anonymity -- Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus -- Timed Spi-Calculus with Types for Secrecy and Authenticity -- Selecting Theories and Recursive Protocols -- Constraint Solving for Contract-Signing Protocols -- A Ground-Complete Axiomatization of Finite State Processes in Process Algebra -- Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP -- Bisimulations Up-to for the Linear Time Branching Time Spectrum -- Deriving Weak Bisimulation Congruences from Reduction Systems -- SOS for Higher Order Processes -- The Individual and Collective Token Interpretations of Petri Nets -- Merged Processes — A New Condensed Representation of Petri Net Behaviour -- Concurrent Clustered Programming -- A Theory of System Behaviour in the Presence of Node and Link Failures -- Comparing Two Approaches to Compensable Flow Composition -- Transactions in RCCS -- Two-Player Nonzero-Sum ?-Regular Games -- Games Where You Can Play Optimally Without Any Memory -- On Implementation of Global Concurrent Systems with Local Asynchronous Controllers -- Defining Fairness -- Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems -- Termination Analysis of Integer Linear Loops -- A Practical Application of Geometric Semantics to Static Analysis of Concurrent Programs -- Verification of Qualitative ? Constraints -- Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces -- Taming Interface Specifications -- Synthesis of Distributed Systems from Knowledge-Based Specifications.
Record Nr. UNISA-996465918203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles of Security and Trust [[electronic resource] ] : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer
Principles of Security and Trust [[electronic resource] ] : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 307 p. 48 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
E-commerce
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Cryptology
e-Commerce/e-business
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto non controllato POST
Software
ETAPS
Security
ISBN 3-642-54792-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks.
Record Nr. UNISA-996203270903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer
Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 307 p. 48 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Data encryption (Computer science)
E-commerce
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Cryptology
e-Commerce/e-business
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto non controllato POST
Software
ETAPS
Security
ISBN 3-642-54792-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks.
Record Nr. UNINA-9910484856903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente
Trustworthy Global Computing [[electronic resource] ] : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 331 p. 60 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Machine theory
Application software
Computer engineering
Computer networks
Data and Information Security
Formal Languages and Automata Theory
Computer and Information Systems Applications
Computer Engineering and Networks
ISBN 3-319-05119-9
Classificazione DAT 252f
DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Content-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations.
Record Nr. UNISA-996203275903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trustworthy Global Computing : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente
Trustworthy Global Computing : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 331 p. 60 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Machine theory
Application software
Computer engineering
Computer networks
Data and Information Security
Formal Languages and Automata Theory
Computer and Information Systems Applications
Computer Engineering and Networks
ISBN 3-319-05119-9
Classificazione DAT 252f
DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Content-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations.
Record Nr. UNINA-9910483014403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui