Cargando…

Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Barthe, Gilles (Editor ), Fournet, Cédric (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Theoretical Computer Science and General Issues, 4912
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Trustworthy Global Computing
  • Elimination of Ghost Variables in Program Logics
  • Web Service Composition: From Analysis to Autonomy
  • Service Combinators for Farming Virtual Machines
  • Accepted Papers
  • Combining a Verification Condition Generator for a Bytecode Language with Static Analyses
  • Extracting Control from Data: User Interfaces of MIDP Applications
  • Extending Operational Semantics of the Java Bytecode
  • Relational Analysis for Delivery of Services
  • Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
  • Type-Safe Distributed Programming with ML5
  • Transactional Service Level Agreement
  • On the Complexity of Termination Inference for Processes
  • A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing
  • Access Control Based on Code Identity for Open Distributed Systems
  • Service Oriented Architectural Design
  • Replicating Web Services for Scalability
  • Location-Aware Quality of Service Measurements for Service-Level Agreements
  • Multipoint Session Types for a Distributed Calculus
  • On Progress for Structured Communications
  • A Protocol Compiler for Secure Sessions in ML
  • Application of Dependency Graphs to Security Protocol Analysis
  • Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols
  • Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus
  • Tutorial Papers
  • Formal Approaches to Information-Hiding (Tutorial)
  • Computational Soundness of Equational Theories (Tutorial)
  • Adversaries and Information Leaks (Tutorial).