Trustworthy Global Computing Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Barthe, Gilles (Επιμελητής έκδοσης), Fournet, Cédric (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Σειρά:Lecture Notes in Computer Science, 4912
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Trustworthy Global Computing
  • Elimination of Ghost Variables in Program Logics
  • Web Service Composition: From Analysis to Autonomy
  • Service Combinators for Farming Virtual Machines
  • Accepted Papers
  • Combining a Verification Condition Generator for a Bytecode Language with Static Analyses
  • Extracting Control from Data: User Interfaces of MIDP Applications
  • Extending Operational Semantics of the Java Bytecode
  • Relational Analysis for Delivery of Services
  • Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
  • Type-Safe Distributed Programming with ML5
  • Transactional Service Level Agreement
  • On the Complexity of Termination Inference for Processes
  • A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing
  • Access Control Based on Code Identity for Open Distributed Systems
  • Service Oriented Architectural Design
  • Replicating Web Services for Scalability
  • Location-Aware Quality of Service Measurements for Service-Level Agreements
  • Multipoint Session Types for a Distributed Calculus
  • On Progress for Structured Communications
  • A Protocol Compiler for Secure Sessions in ML
  • Application of Dependency Graphs to Security Protocol Analysis
  • Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols
  • Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus
  • Tutorial Papers
  • Formal Approaches to Information-Hiding (Tutorial)
  • Computational Soundness of Equational Theories (Tutorial)
  • Adversaries and Information Leaks (Tutorial).