FEEDBACK Smiley face
Normal view MARC view ISBD view

Construction and Analysis of Safe, Secure, and Interoperable Smart Devices [electronic resource] :Second International Workshop, CASSIS 2005, Nice, France, March 8-11, 2005, Revised Selected Papers /

Contributor(s): Barthe, Gilles [editor.] | Grégoire, Benjamin [editor.] | Huisman, Marieke [editor.] | Lanet, Jean-Louis [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 3956Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.Description: X, 173 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540336914.Subject(s): Computer science | Special purpose computers | Computer programming | Software engineering | Programming languages (Electronic computers) | Operating systems (Computers) | Computer logic | Computer Science | Software Engineering | Special Purpose and Application-Based Systems | Programming Techniques | Programming Languages, Compilers, Interpreters | Operating Systems | Logics and Meanings of ProgramsOnline resources: Click here to access online
Contents:
The Architecture of a Privacy-Aware Access Control Decision Component -- Mobile Resource Guarantees and Policies -- Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks -- Romization: Early Deployment and Customization of Java Systems for Constrained Devices -- Typed Compilation Against Non-manifest Base Classes -- The Design of Application-Tailorable Operating System Product Lines -- Bringing Ease and Adaptability to MPSoC Software Design: A Component-Based Approach -- Modular Proof Principles for Parameterised Concretizations -- Formalisation and Verification of the GlobalPlatform Card Specification Using the B Method.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

The Architecture of a Privacy-Aware Access Control Decision Component -- Mobile Resource Guarantees and Policies -- Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks -- Romization: Early Deployment and Customization of Java Systems for Constrained Devices -- Typed Compilation Against Non-manifest Base Classes -- The Design of Application-Tailorable Operating System Product Lines -- Bringing Ease and Adaptability to MPSoC Software Design: A Component-Based Approach -- Modular Proof Principles for Parameterised Concretizations -- Formalisation and Verification of the GlobalPlatform Card Specification Using the B Method.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in