Trustworthy Global Computing
Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers (Lecture Notes in Computer Science)
Elsewhere $187.95 $91.86 Save $96.09 (51%)
Free shipping Australia wide
Order Now for Christmas with e-Gift
|Format: ||Paperback, 401 pages, 2008 Edition|
|Other Information: ||biography|
|Published In: ||Germany, 01 June 2008|
This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis,France,November 5-6,2007,andtutorialpapersofthe foll- ing Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. TheSymposiumonTrustworthyGlobalComputingisaninternationalannual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices. This volume starts with an invited paper from Martin Hofmann. It then - cludes the revised versions of the 19 contributed papers; these versions take into accountboth the referee's reports andthe discussions that took place during the symposium. The Program Committee selected 19 papers from 48 submissions. Every submission was reviewed by at least three members of the ProgramC- mittee. In addition, the Program Committee sought the opinions of additional referees, selected because of their expertise on particular topics. We are grateful to Andrei Voronkov for his EasyChair system that helped us to manage these discussions. We would like to thank the authors who submitted papers to the conference, the members of the ProgramCommittee, and the additional revi- ers for their excellent work. We would also like to thank the invited speakers to TGC 2007, Andrew D. Gordon, Martin Hofmann, and Je? Magee.
Table of Contents
Trustworthy Global Computing.- Elimination of Ghost Variables in Program Logics.- Web Service Composition: From Analysis to Autonomy.- Service Combinators for Farming Virtual Machines.- Accepted Papers.- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses.- Extracting Control from Data: User Interfaces of MIDP Applications.- Extending Operational Semantics of the Java Bytecode.- Relational Analysis for Delivery of Services.- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems.- Type-Safe Distributed Programming with ML5.- Transactional Service Level Agreement.- On the Complexity of Termination Inference for Processes.- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.- Access Control Based on Code Identity for Open Distributed Systems.- Service Oriented Architectural Design.- Replicating Web Services for Scalability.- Location-Aware Quality of Service Measurements for Service-Level Agreements.- Multipoint Session Types for a Distributed Calculus.- On Progress for Structured Communications.- A Protocol Compiler for Secure Sessions in ML.- Application of Dependency Graphs to Security Protocol Analysis.- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus.- Tutorial Papers.- Formal Approaches to Information-Hiding (Tutorial).- Computational Soundness of Equational Theories (Tutorial).- Adversaries and Information Leaks (Tutorial).
Springer-Verlag Berlin and Heidelberg GmbH & Co. K|
23.11 x 15.49 x 2.54 centimetres (0.64 kg)|
15+ years |