Back to Search

Trustworthy Global Computing: 7th International Symposium, Tgc 2012, Newcastle Upon Tyne, Uk, September 7-8, 2012, Revised Selected Papers

PUBLISHER Springer (09/13/2013)
PRODUCT TYPE Paperback (Paperback)

Description
From Rational Number Reconstruction to Set Reconciliation and File Synchronization.- Affine Refinement Types for Authentication and Authorization.- Seamless Distributed Computing from the Geometry of Interaction.- A Beginner's Guide to the DeadLock Analysis Model.- Formal Modeling and Reasoning about the Android Security Framework.- A Type System for Flexible Role Assignment in Multiparty Communicating Systems.- A Multiparty Multi-session Logic.- LTS Semantics for Compensation-Based Processes.- Linking Unlinkability.- Towards Quantitative Analysis of Opacity.- An Algebra for Symbolic Diffie-Hellman Protocol Analysis.- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability.- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.
Show More
Product Format
Product Details
ISBN-13: 9783642411564
ISBN-10: 3642411568
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 213
Carton Quantity: 34
Product Dimensions: 6.14 x 0.47 x 9.21 inches
Weight: 0.70 pound(s)
Feature Codes: Illustrated
Country of Origin: NL
Subject Information
BISAC Categories
Computers | Security - Cryptography & Encryption
Computers | Networking - Hardware
Computers | Information Management
Dewey Decimal: 003.54
Descriptions, Reviews, Etc.
jacket back
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.
Show More
publisher marketing
From Rational Number Reconstruction to Set Reconciliation and File Synchronization.- Affine Refinement Types for Authentication and Authorization.- Seamless Distributed Computing from the Geometry of Interaction.- A Beginner's Guide to the DeadLock Analysis Model.- Formal Modeling and Reasoning about the Android Security Framework.- A Type System for Flexible Role Assignment in Multiparty Communicating Systems.- A Multiparty Multi-session Logic.- LTS Semantics for Compensation-Based Processes.- Linking Unlinkability.- Towards Quantitative Analysis of Opacity.- An Algebra for Symbolic Diffie-Hellman Protocol Analysis.- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability.- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.
Show More
List Price $49.99
Your Price  $49.49
Paperback