Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers /

Trustworthy Global Computing 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / [electronic resource] : edited by Martín Abadi, Alberto Lluch Lafuente. - 1st ed. 2014. - X, 331 p. 60 illus. online resource. - Theoretical Computer Science and General Issues, 8358 2512-2029 ; . - Theoretical Computer Science and General Issues, 8358 .

Content-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations.

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, π-calculus, information flow, models, specifications and proofs and quantitative analysis.

9783319051192

10.1007/978-3-319-05119-2 doi


Data protection.
Machine theory.
Application software.
Computer engineering.
Computer networks .
Data and Information Security.
Formal Languages and Automata Theory.
Computer and Information Systems Applications.
Computer Engineering and Networks.

QA76.9.A25

005.8
© 2024 IIIT-Delhi, library@iiitd.ac.in