Trustworthy Global Computing
Editat de Gilles Barthe, Cédric Fourneten Limba Engleză Paperback – 18 mar 2008
Preț: 327.28 lei
Preț vechi: 409.10 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
57.92€ • 67.54$ • 50.85£
57.92€ • 67.54$ • 50.85£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540786627
ISBN-10: 3540786627
Pagini: 420
Ilustrații: XI, 401 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2008
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540786627
Pagini: 420
Ilustrații: XI, 401 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2008
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Trustworthy Global Computing.- Elimination of Ghost Variables in Program Logics.- Web Service Composition: From Analysis to Autonomy.- Service Combinators for Farming Virtual Machines.- Accepted Papers.- Combining a Verification Condition Generator for a Bytecode Language with Static Analyses.- Extracting Control from Data: User Interfaces of MIDP Applications.- Extending Operational Semantics of the Java Bytecode.- Relational Analysis for Delivery of Services.- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems.- Type-Safe Distributed Programming with ML5.- Transactional Service Level Agreement.- On the Complexity of Termination Inference for Processes.- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing.- Access Control Based on Code Identity for Open Distributed Systems.- Service Oriented Architectural Design.- Replicating Web Services for Scalability.- Location-Aware Quality of Service Measurements for Service-Level Agreements.- Multipoint Session Types for a Distributed Calculus.- On Progress for Structured Communications.- A Protocol Compiler for Secure Sessions in ML.- Application of Dependency Graphs to Security Protocol Analysis.- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.- Anonymity Protocol with Identity Escrow and Analysis in the Applied ?-Calculus.- Tutorial Papers.- Formal Approaches to Information-Hiding (Tutorial).- Computational Soundness of Equational Theories (Tutorial).- Adversaries and Information Leaks (Tutorial).