Trustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Select by Catuscia PalamidessiTrustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Select by Catuscia Palamidessi

Trustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK…

byCatuscia PalamidessiEditorMark D. Ryan

Paperback | September 13, 2013

Pricing and Purchase Info

$73.61 online 
$75.95 list price
Earn 368 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.
Title:Trustworthy Global Computing: 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK…Format:PaperbackDimensions:213 pages, 23.5 × 15.5 × 0.01 inPublished:September 13, 2013Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3642411568

ISBN - 13:9783642411564

Reviews

Table of Contents

From Rational Number Reconstruction to Set Reconciliation and File Synchronization.- Affine Refinement Types for Authentication and Authorization.- Seamless Distributed Computing from the Geometry of Interaction.- A Beginner's Guide to the DeadLock Analysis Model.- Formal Modeling and Reasoning about the Android Security Framework.- A Type System for Flexible Role Assignment in Multiparty Communicating Systems.- A Multiparty Multi-session Logic.- LTS Semantics for Compensation-Based Processes.- Linking Unlinkability.- Towards Quantitative Analysis of Opacity.- An Algebra for Symbolic Diffie-Hellman Protocol Analysis.- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability.- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.