Trustworthy Global Computing

Trustworthy Global Computing
-0 %
Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers
 Paperback
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I

Unser bisheriger Preis:ORGPRICE: 53,49 €

Jetzt 53,48 €* Paperback

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9783540786627
Veröffentl:
2008
Einband:
Paperback
Erscheinungsdatum:
18.03.2008
Seiten:
420
Autor:
Cédric Fournet
Gewicht:
633 g
Format:
235x155x23 mm
Serie:
4912, Theoretical Computer Science and General Issues
Sprache:
Englisch
Beschreibung:

This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis,France,November 5 6,2007,andtutorialpapersofthe foll- ing Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. TheSymposiumonTrustworthyGlobalComputingisaninternationalannual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices. This volume starts with an invited paper from Martin Hofmann. It then - cludes the revised versions of the 19 contributed papers; these versions take into accountboth the referee s reports andthe discussions that took place during the symposium. The Program Committee selected 19 papers from 48 submissions. Every submission was reviewed by at least three members of the ProgramC- mittee. In addition, the Program Committee sought the opinions of additional referees, selected because of their expertise on particular topics. We are grateful to Andrei Voronkov for his EasyChair system that helped us to manage these discussions. We would like to thank the authors who submitted papers to the conference, the members of the ProgramCommittee, and the additional revi- ers for their excellent work. We would also like to thank the invited speakers to TGC 2007, Andrew D. Gordon, Martin Hofmann, and Je? Magee.
This book constitutes the thoroughly refereed post-conference proceedings of the Third Symposium on Trustworthy Global Computing, TGC 2007; it also contains tutorials from the adjacent Workshop on the Interplay of Programming Languages and Cryptography.
Trustworthy Global Computing.- Elimination of Ghost Variables in Program Logics.- Web Service Composition: From Analysis to Autonomy.- Service Combinators for Farming Virtual Machines.- Accepted Papers.- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses.- Extracting Control from Data: User Interfaces of MIDP Applications.- Extending Operational Semantics of the Java Bytecode.- Relational Analysis for Delivery of Services.- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems.- Type-Safe Distributed Programming with ML5.- Transactional Service Level Agreement.- On the Complexity of Termination Inference for Processes.- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.- Access Control Based on Code Identity for Open Distributed Systems.- Service Oriented Architectural Design.- Replicating Web Services for Scalability.- Location-Aware Quality of Service Measurements for Service-Level Agreements.- Multipoint Session Types for a Distributed Calculus.- On Progress for Structured Communications.- A Protocol Compiler for Secure Sessions in ML.- Application of Dependency Graphs to Security Protocol Analysis.- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus.- Tutorial Papers.- Formal Approaches to Information-Hiding (Tutorial).- Computational Soundness of Equational Theories (Tutorial).- Adversaries and Information Leaks (Tutorial).

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.