000 04022nam a22006135i 4500
001 978-3-319-05119-2
003 DE-He213
005 20240730180906.0
007 cr nn 008mamaa
008 140307s2014 sz | s |||| 0|eng d
020 _a9783319051192
_9978-3-319-05119-2
024 7 _a10.1007/978-3-319-05119-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aTrustworthy Global Computing
_h[electronic resource] :
_b8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers /
_cedited by Martín Abadi, Alberto Lluch Lafuente.
250 _a1st ed. 2014.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2014.
300 _aX, 331 p. 60 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v8358
505 0 _aContent-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations.
520 _aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, π-calculus, information flow, models, specifications and proofs and quantitative analysis.
650 0 _aData protection.
_97245
650 0 _aMachine theory.
_9122355
650 0 _aApplication software.
_9122356
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 1 4 _aData and Information Security.
_931990
650 2 4 _aFormal Languages and Automata Theory.
_9122357
650 2 4 _aComputer and Information Systems Applications.
_9122358
650 2 4 _aComputer Engineering and Networks.
_9122359
700 1 _aAbadi, Martín.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122360
700 1 _aLluch Lafuente, Alberto.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9122361
710 2 _aSpringerLink (Online service)
_9122362
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319051185
776 0 8 _iPrinted edition:
_z9783319051208
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v8358
_9122363
856 4 0 _uhttps://doi.org/10.1007/978-3-319-05119-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c90570
_d90570