Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / [electronic resource] : edited by Catuscia Palamidessi, Mark D. Ryan. - 1st ed. 2013. - X, 213 p. 37 illus. online resource. - Theoretical Computer Science and General Issues, 8191 2512-2029 ; . - Theoretical Computer Science and General Issues, 8191 .

From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner's Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.

9783642411571

10.1007/978-3-642-41157-1 doi


Cryptography.
Data encryption (Computer science).
Computer networks .
Electronic data processing--Management.
Algorithms.
Software engineering.
Coding theory.
Information theory.
Cryptology.
Computer Communication Networks.
IT Operations.
Algorithms.
Software Engineering.
Coding and Information Theory.

QA268

005.824