Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2008.
|
Edición: | 1st ed. 2008. |
Colección: | Theoretical Computer Science and General Issues,
4912 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Trustworthy Global Computing
- Elimination of Ghost Variables in Program Logics
- Web Service Composition: From Analysis to Autonomy
- Service Combinators for Farming Virtual Machines
- Accepted Papers
- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses
- Extracting Control from Data: User Interfaces of MIDP Applications
- Extending Operational Semantics of the Java Bytecode
- Relational Analysis for Delivery of Services
- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
- Type-Safe Distributed Programming with ML5
- Transactional Service Level Agreement
- On the Complexity of Termination Inference for Processes
- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing
- Access Control Based on Code Identity for Open Distributed Systems
- Service Oriented Architectural Design
- Replicating Web Services for Scalability
- Location-Aware Quality of Service Measurements for Service-Level Agreements
- Multipoint Session Types for a Distributed Calculus
- On Progress for Structured Communications
- A Protocol Compiler for Secure Sessions in ML
- Application of Dependency Graphs to Security Protocol Analysis
- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols
- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus
- Tutorial Papers
- Formal Approaches to Information-Hiding (Tutorial)
- Computational Soundness of Equational Theories (Tutorial)
- Adversaries and Information Leaks (Tutorial).