Cantitate/Preț
Produs

Trustworthy Global Computing: Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4912

Editat de Gilles Barthe, Cédric Fournet
en Limba Engleză Paperback – 18 mar 2008

Din seria Lecture Notes in Computer Science

Preț: 33264 lei

Preț vechi: 41580 lei
-20% Nou

Puncte Express: 499

Preț estimativ în valută:
6366 6613$ 5288£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540786627
ISBN-10: 3540786627
Pagini: 420
Ilustrații: XI, 401 p.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.61 kg
Ediția:2008
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Theoretical Computer Science and General Issues

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Trustworthy Global Computing.- Elimination of Ghost Variables in Program Logics.- Web Service Composition: From Analysis to Autonomy.- Service Combinators for Farming Virtual Machines.- Accepted Papers.- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses.- Extracting Control from Data: User Interfaces of MIDP Applications.- Extending Operational Semantics of the Java Bytecode.- Relational Analysis for Delivery of Services.- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems.- Type-Safe Distributed Programming with ML5.- Transactional Service Level Agreement.- On the Complexity of Termination Inference for Processes.- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.- Access Control Based on Code Identity for Open Distributed Systems.- Service Oriented Architectural Design.- Replicating Web Services for Scalability.- Location-Aware Quality of Service Measurements for Service-Level Agreements.- Multipoint Session Types for a Distributed Calculus.- On Progress for Structured Communications.- A Protocol Compiler for Secure Sessions in ML.- Application of Dependency Graphs to Security Protocol Analysis.- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus.- Tutorial Papers.- Formal Approaches to Information-Hiding (Tutorial).- Computational Soundness of Equational Theories (Tutorial).- Adversaries and Information Leaks (Tutorial).