Trustworthy Global Computing 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / [electronic resource] :
edited by Catuscia Palamidessi, Mark D. Ryan.
- 1st ed. 2013.
- X, 213 p. 37 illus. online resource.
- Theoretical Computer Science and General Issues, 8191 2512-2029 ; .
- Theoretical Computer Science and General Issues, 8191 .
From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner's Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.
9783642411571
10.1007/978-3-642-41157-1 doi
Cryptography. Data encryption (Computer science). Computer networks . Electronic data processing--Management. Algorithms. Software engineering. Coding theory. Information theory. Cryptology. Computer Communication Networks. IT Operations. Algorithms. Software Engineering. Coding and Information Theory.