CONCUR 2005 - Concurrency Theory [[electronic resource] ] : 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings / / edited by Martín Abadi, Luca de Alfaro |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (XXIV, 1280 p.) |
Disciplina | 004/.35 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Computer systems
Computer science Compilers (Computer programs) Computer programming Computer System Implementation Theory of Computation Computer Science Logic and Foundations of Programming Compilers and Interpreters Programming Techniques |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lectures -- Static Analysis Versus Model Checking for Bug Finding -- The Benefits of Exposing Calls and Returns -- A Compositional Approach to the Stochastic Dynamics of Gene Networks -- Contributed Papers -- Games Other People Play -- Type-Directed Concurrency -- Multiport Interaction Nets and Concurrency -- Model Checking for ?-Calculus Using Proof Search -- A Game Semantics of the Asynchronous ?-Calculus -- Efficient On-the-Fly Algorithms for the Analysis of Timed Games -- Modal Logics for Timed Control -- Timed Shuffle Expressions -- A New Modality for Almost Everywhere Properties in Timed Automata -- The Coarsest Congruence for Timed Automata with Deadlines Contained in Bisimulation -- A Behavioural Pseudometric for Metric Labelled Transition Systems -- On Probabilistic Program Equivalence and Refinement -- Probabilistic Anonymity -- Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus -- Timed Spi-Calculus with Types for Secrecy and Authenticity -- Selecting Theories and Recursive Protocols -- Constraint Solving for Contract-Signing Protocols -- A Ground-Complete Axiomatization of Finite State Processes in Process Algebra -- Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP -- Bisimulations Up-to for the Linear Time Branching Time Spectrum -- Deriving Weak Bisimulation Congruences from Reduction Systems -- SOS for Higher Order Processes -- The Individual and Collective Token Interpretations of Petri Nets -- Merged Processes — A New Condensed Representation of Petri Net Behaviour -- Concurrent Clustered Programming -- A Theory of System Behaviour in the Presence of Node and Link Failures -- Comparing Two Approaches to Compensable Flow Composition -- Transactions in RCCS -- Two-Player Nonzero-Sum ?-Regular Games -- Games Where You Can Play Optimally Without Any Memory -- On Implementation of Global Concurrent Systems with Local Asynchronous Controllers -- Defining Fairness -- Regular Symbolic Analysis of Dynamic Networks of Pushdown Systems -- Termination Analysis of Integer Linear Loops -- A Practical Application of Geometric Semantics to Static Analysis of Concurrent Programs -- Verification of Qualitative ? Constraints -- Uniform Satisfiability Problem for Local Temporal Logics over Mazurkiewicz Traces -- Taming Interface Specifications -- Synthesis of Distributed Systems from Knowledge-Based Specifications. |
Record Nr. | UNISA-996465918203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust [[electronic resource] ] : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 307 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) E-commerce Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Cryptology e-Commerce/e-business Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto non controllato |
POST
Software ETAPS Security |
ISBN | 3-642-54792-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks. |
Record Nr. | UNISA-996203270903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust : Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings / / edited by Martín Abadi, Steve Kremer |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 307 p. 48 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) E-commerce Management information systems Computer science Algorithms Systems and Data Security Computer Communication Networks Cryptology e-Commerce/e-business Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
Soggetto non controllato |
POST
Software ETAPS Security |
ISBN | 3-642-54792-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Reduced Semantics for Deciding Trace Equivalence Using Constraint Systems -- Stateful Applied Pi Calculus -- Computational Soundness Results for ProVerif: Bridging the Gap from Trace Properties to Uniformity -- A Secure Key Management Interface with Asymmetric Cryptography -- Quantitative Aspects of Information Flow Abstract Channels and Their Robust Information-Leakage Ordering -- Quantitative Information Flow in Boolean Programs -- When Not All Bits Are Equal: Worth-Based Information Flow -- Leakage Resilience against Concurrent Cache Attacks -- Information Flow Control in WebKit’s JavaScript Bytecode -- A Separation Logic for Enforcing Declarative Information Flow Control Policies -- Defining and Enforcing Referential Security -- Extending and Applying a Framework for the Cryptographic Verification of Java Programs -- Compiling CAO: From Cryptographic Specifications to C Implementations -- Decentralized Composite Access Control -- Temporal Logics for Hyperproperties -- Time-Dependent Analysis of Attacks. |
Record Nr. | UNINA-9910484856903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Trustworthy Global Computing [[electronic resource] ] : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 331 p. 60 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Data protection
Machine theory Application software Computer engineering Computer networks Data and Information Security Formal Languages and Automata Theory Computer and Information Systems Applications Computer Engineering and Networks |
ISBN | 3-319-05119-9 |
Classificazione |
DAT 252f
DAT 460f DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Content-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations. |
Record Nr. | UNISA-996203275903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trustworthy Global Computing : 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / / edited by Martín Abadi, Alberto Lluch Lafuente |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 331 p. 60 illus.) |
Disciplina | 005.8 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Data protection
Machine theory Application software Computer engineering Computer networks Data and Information Security Formal Languages and Automata Theory Computer and Information Systems Applications Computer Engineering and Networks |
ISBN | 3-319-05119-9 |
Classificazione |
DAT 252f
DAT 460f DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Content-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations. |
Record Nr. | UNINA-9910483014403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|