|
![]() |
|||
|
||||
OverviewThis book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way. Full Product DetailsAuthor: Catuscia Palamidessi , Mark D. RyanPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2013 ed. Volume: 8191 Dimensions: Width: 15.50cm , Height: 1.20cm , Length: 23.50cm Weight: 0.454kg ISBN: 9783642411564ISBN 10: 3642411568 Pages: 213 Publication Date: 13 September 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsFrom Rational Number Reconstruction to Set Reconciliation and File Synchronization.- Affine Refinement Types for Authentication and Authorization.- Seamless Distributed Computing from the Geometry of Interaction.- A Beginner’s Guide to the DeadLock Analysis Model.- Formal Modeling and Reasoning about the Android Security Framework.- A Type System for Flexible Role Assignment in Multiparty Communicating Systems.- A Multiparty Multi-session Logic.- LTS Semantics for Compensation-Based Processes.- Linking Unlinkability.- Towards Quantitative Analysis of Opacity.- An Algebra for Symbolic Diffie-Hellman Protocol Analysis.- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability.- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |