|
|
|
|
LEADER |
03236nam a22005295i 4500 |
001 |
978-3-662-45917-1 |
003 |
DE-He213 |
005 |
20151204182715.0 |
007 |
cr nn 008mamaa |
008 |
141222s2014 gw | s |||| 0|eng d |
020 |
|
|
|a 9783662459171
|9 978-3-662-45917-1
|
024 |
7 |
|
|a 10.1007/978-3-662-45917-1
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Trustworthy Global Computing
|h [electronic resource] :
|b 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers /
|c edited by Matteo Maffei, Emilio Tuosto.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2014.
|
300 |
|
|
|a XV, 193 p. 50 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8902
|
505 |
0 |
|
|a Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM – Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.
|
520 |
|
|
|a This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Mathematical logic.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Mathematical Logic and Formal Languages.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
|
|a Maffei, Matteo.
|e editor.
|
700 |
1 |
|
|a Tuosto, Emilio.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783662459164
|
830 |
|
0 |
|a Lecture Notes in Computer Science,
|x 0302-9743 ;
|v 8902
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-662-45917-1
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|