|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-662-45917-1 |
003 |
DE-He213 |
005 |
20230329231637.0 |
007 |
cr nn 008mamaa |
008 |
141222s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662459171
|9 978-3-662-45917-1
|
024 |
7 |
|
|a 10.1007/978-3-662-45917-1
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trustworthy Global Computing
|h [electronic resource] :
|b 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers /
|c edited by Matteo Maffei, Emilio Tuosto.
|
250 |
|
|
|a 1st ed. 2014.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XV, 193 p. 50 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Theoretical Computer Science and General Issues,
|x 2512-2029 ;
|v 8902
|
505 |
0 |
|
|a Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Machine theory.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Formal Languages and Automata Theory.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
700 |
1 |
|
|a Maffei, Matteo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Tuosto, Emilio.
|e editor.
|0 (orcid)0000-0002-7032-3281
|1 https://orcid.org/0000-0002-7032-3281
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662459188
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662459164
|
830 |
|
0 |
|a Theoretical Computer Science and General Issues,
|x 2512-2029 ;
|v 8902
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-662-45917-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|