000 | 03661nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-662-45917-1 | ||
003 | DE-He213 | ||
005 | 20240730191902.0 | ||
007 | cr nn 008mamaa | ||
008 | 141222s2014 gw | s |||| 0|eng d | ||
020 |
_a9783662459171 _9978-3-662-45917-1 |
||
024 | 7 |
_a10.1007/978-3-662-45917-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrustworthy Global Computing _h[electronic resource] : _b9th International Symposium, TGC 2014, Rome, Italy, September 5-6, 2014. Revised Selected Papers / _cedited by Matteo Maffei, Emilio Tuosto. |
250 | _a1st ed. 2014. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2014. |
|
300 |
_aXV, 193 p. 50 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v8902 |
|
505 | 0 | _aGeneralized bisimulation metrics (Abstract) -- Electronic voting: how to ensure privacy and verifiability -- A Secure Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives -- Finding a Forest in a Tree -- Automata for Analyzing Service Contracts -- On duality relations for session types -- Characterizing Testing Preorders for Broadcasting Distributed Systems -- Tests for establishing security properties -- A class of automata for the verification of infinite, resource-allocating Behaviours -- Multiparty Session Nets -- Interaction and causality in digital signature exchange protocols -- Session Types with Gradual Typing -- Corecursion and Non-Divergence in Session-Typed Processes -- Trust-based Enforcement of Security Policies. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Trustworthy Global Computing, TGC 2014, held in Rome, Italy, in September 2014. The 15 revised full papers presented were carefully reviewed and selected from 23 submissions. The Symposium on Trustworthy Global Computing focuses on frameworks, tools, algorithms, and protocols for open-ended, large-scale systems and applications, and on rigorous reasoning about their behavior and properties. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aMachine theory. _9147706 |
|
650 | 0 |
_aApplication software. _9147707 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aFormal Languages and Automata Theory. _9147708 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9147709 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9147710 |
700 | 1 |
_aMaffei, Matteo. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9147711 |
|
700 | 1 |
_aTuosto, Emilio. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9147712 |
|
710 | 2 |
_aSpringerLink (Online service) _9147713 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783662459164 |
776 | 0 | 8 |
_iPrinted edition: _z9783662459188 |
830 | 0 |
_aTheoretical Computer Science and General Issues, _x2512-2029 ; _v8902 _9147714 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-662-45917-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c93956 _d93956 |