Trustworthy Global Computing (Record no. 53614)

000 -LEADER
fixed length control field 03235nam a22005415i 4500
001 - CONTROL NUMBER
control field 978-3-662-45917-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111157.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 141222s2014 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783662459171
-- 978-3-662-45917-1
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Trustworthy Global Computing
Sub Title 9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers /
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 193 p. 50 illus.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Generalized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing  focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties.
700 1# - AUTHOR 2
Author 2 Maffei, Matteo.
700 1# - AUTHOR 2
Author 2 Tuosto, Emilio.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-662-45917-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg :
-- Imprint: Springer,
-- 2014.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer organization.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematical logic.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mathematical Logic and Formal Languages.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information Systems Applications (incl. Internet).
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Systems Organization and Communication Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-LNC

No items available.