000 03860nam a22005895i 4500
001 978-3-540-78663-4
003 DE-He213
005 20240423125736.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 _a9783540786634
_9978-3-540-78663-4
024 7 _a10.1007/978-3-540-78663-4
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
245 1 0 _aTrustworthy Global Computing
_h[electronic resource] :
_bThird Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers /
_cedited by Gilles Barthe, Cédric Fournet.
250 _a1st ed. 2008.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2008.
300 _aXI, 401 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v4912
505 0 _aTrustworthy Global Computing -- Elimination of Ghost Variables in Program Logics -- Web Service Composition: From Analysis to Autonomy -- Service Combinators for Farming Virtual Machines -- Accepted Papers -- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses -- Extracting Control from Data: User Interfaces of MIDP Applications -- Extending Operational Semantics of the Java Bytecode -- Relational Analysis for Delivery of Services -- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems -- Type-Safe Distributed Programming with ML5 -- Transactional Service Level Agreement -- On the Complexity of Termination Inference for Processes -- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing -- Access Control Based on Code Identity for Open Distributed Systems -- Service Oriented Architectural Design -- Replicating Web Services for Scalability -- Location-Aware Quality of Service Measurements for Service-Level Agreements -- Multipoint Session Types for a Distributed Calculus -- On Progress for Structured Communications -- A Protocol Compiler for Secure Sessions in ML -- Application of Dependency Graphs to Security Protocol Analysis -- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols -- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus -- Tutorial Papers -- Formal Approaches to Information-Hiding (Tutorial) -- Computational Soundness of Equational Theories (Tutorial) -- Adversaries and Information Leaks (Tutorial).
650 0 _aSoftware engineering.
650 0 _aComputer networks .
650 0 _aComputer programming.
650 0 _aData protection.
650 0 _aCompilers (Computer programs).
650 1 4 _aSoftware Engineering.
650 2 4 _aComputer Communication Networks.
650 2 4 _aProgramming Techniques.
650 2 4 _aData and Information Security.
650 2 4 _aCompilers and Interpreters.
700 1 _aBarthe, Gilles.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aFournet, Cédric.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540786627
776 0 8 _iPrinted edition:
_z9783540847823
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v4912
856 4 0 _uhttps://doi.org/10.1007/978-3-540-78663-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c181224
_d181224