000 | 03235nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-662-45917-1 | ||
003 | DE-He213 | ||
005 | 20200421111157.0 | ||
007 | cr nn 008mamaa | ||
008 | 141222s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662459171 _9978-3-662-45917-1 |
||
024 | 7 |
_a10.1007/978-3-662-45917-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrustworthy Global Computing _h[electronic resource] : _b9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / _cedited by Matteo Maffei, Emilio Tuosto. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXV, 193 p. 50 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8902 |
|
505 | 0 | _aGeneralized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aMathematical logic. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aMathematical Logic and Formal Languages. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
700 | 1 |
_aMaffei, Matteo. _eeditor. |
|
700 | 1 |
_aTuosto, Emilio. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662459164 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8902 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-45917-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c53614 _d53614 |