Logo - springer
Slogan - springer

Computer Science - Software Engineering | Trustworthy Global Computing - International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005.

Trustworthy Global Computing

International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005. Revised Selected Papers

De Nicola, Rocco, Sangiorgi, Davide (Eds.)

2005, VIII, 371 p. Also available online.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$79.99

(net) price for USA

ISBN 978-3-540-31483-7

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$109.00

(net) price for USA

ISBN 978-3-540-30007-6

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Computing technology has become ubiquitous, from global applications to - nuscule embedded devices. Trust in computing is vital to help protect public safety,nationalsecurity,andeconomicprosperity.Anewareaofresearch,known as global computing, has recently emerged that aims at de?ning new models of computation based on code and data mobility over wide area networks with highly dynamic topologies, and that aims at providing infrastructures to s- port coordination and control ofcomponents originatig n fromdi?erent,possibly untrusted, sources.Trustworthyglobalcomputing aims at guaranteeingsafe and reliable network usage, also by providing tools and framework for reasoning about behavior and properties of applications. AnInternationalSymposiumonTrustworthyGlobalComputing(TGC2005), was held in Edinburgh, UK, April 7–9, 2005. The symposium contained pres- tations and discussions dealing with issues such as: – resource usage, – language-based security, – theories of trust and authentication, – privacy, reliability and business integrity, – access control and mechanisms for enforcing it, – models of interaction and dynamic components management, – language concepts and abstraction mechanisms, – test generators, symbolic interpreters, type checkers, – ?nite state model checkers, theorem provers, – software principles to support debugging and veri?cation.

Content Level » Research

Keywords » Debugging - authentication - cryptographic protocols - dependable computing - distributed computing - distributed systems - formal methods - global computing - mobile code - mobile computing - model checking - model-based testing - modeling - programming - verification

Related subjects » Communication Networks - Software Engineering

Table of contents 

Harmony: The Art of Reconciliation.- A Theory of Noninterference for the ?-Calculus.- Typed Processes in Untyped Contexts.- Model–Based Testing of Cryptographic Protocols.- A General Name Binding Mechanism.- Types for Security in a Mobile World.- History-Based Access Control for Distributed Processes.- Programming Cryptographic Protocols.- A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange.- A Formal Semantics for Protocol Narrations.- web ? at Work.- Concurrency Among Strangers.- The Modelling and Analysis of OceanStore Elements Using the CSP Dependability Library.- A Practical Formal Model for Safety Analysis in Capability-Based Systems.- Mixin Modules for Dynamic Rebinding.- A Distributed Object-Oriented Language with Session Types.- Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies.- Automated Analysis of Infinite Scenarios.- Namespace Logic: A Logic for a Reflective Higher-Order Calculus.- Erratum.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Software Engineering / Programming and Operating Systems.