000 | 03605nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-319-05119-2 | ||
003 | DE-He213 | ||
005 | 20200421112229.0 | ||
007 | cr nn 008mamaa | ||
008 | 140307s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319051192 _9978-3-319-05119-2 |
||
024 | 7 |
_a10.1007/978-3-319-05119-2 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aTrustworthy Global Computing _h[electronic resource] : _b8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers / _cedited by Mart�in Abadi, Alberto Lluch Lafuente. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aX, 331 p. 60 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8358 |
|
505 | 0 | _aContent-Driven Reputation for Collaborative Systems -- Challenges for Quantitative Analysis of Collective Adaptive Systems -- The Scribble Protocol Language -- Dynamic Measurement and Protected Execution: Model and Analysis -- Security Correctness for Secure Nested Transactions -- Types for Resources in Psi-Calculi -- A Sorted Semantic Framework for Applied Process Calculi -- Static Deadlock Resolution in the Pi-Calculus -- Fine-Grained and Coarse-Grained Reactive Noninterference -- Information Flow Analysis for Valued-Indexed Data Security Compartments -- A Library For Removing Cache-Based Attacks in Concurrent Information Flow Systems -- Models, Specifications and Proofs -- Specification of Asynchronous Component Systems with Modal I/O-Petri Nets -- A Formal Model for the Deferred Update Replication Technique -- Studying Operational Models of Relaxed Concurrency -- Certificates and Separation Logic -- On-the-Fly Fast Mean-Field Model-Checking -- Group-by-Group Probabilistic Bisimilarities and Their Logical Characterizations. | |
520 | _aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, (Ss(B-calculus, information flow, models, specifications and proofs and quantitative analysis. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aMathematical logic. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aMathematical Logic and Formal Languages. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
700 | 1 |
_aAbadi, Mart�in. _eeditor. |
|
700 | 1 |
_aLluch Lafuente, Alberto. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319051185 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8358 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-05119-2 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57875 _d57875 |