Trustworthy Global Computing: Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-conference proceedings of the Third Symposium on Trustworthy Global Computing, TGC 2007; it moreover contains tutorials from the adjacent Workshop on the Interplay of Programming Languages and Cryptography, both held in Sophia-Antipolis, France, in November 2007.

The 19 revised papers presented together with 3 invited papers were carefully selected from 48 submissions during two rounds of reviewing and improvement. The TGC 2007 symposium papers focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices. The volume concludes with 3 tutorial papers, presented at the co-located Workshop on the Interplay of Programming Languages and Cryptography.

Author(s): Martin Hofmann, Mariela Pavlova (auth.), Gilles Barthe, Cédric Fournet (eds.)
Series: Lecture Notes in Computer Science 4912 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 401
Tags: Software Engineering; Computer Communication Networks; Programming Techniques; Systems and Data Security; Programming Languages, Compilers, Interpreters; Logics and Meanings of Programs

Front Matter....Pages -
Elimination of Ghost Variables in Program Logics....Pages 1-20
Web Service Composition: From Analysis to Autonomy....Pages 21-21
Service Combinators for Farming Virtual Machines....Pages 22-22
Combining a Verification Condition Generator for a Bytecode Language with Static Analyses....Pages 23-40
Extracting Control from Data: User Interfaces of MIDP Applications....Pages 41-56
Extending Operational Semantics of the Java Bytecode....Pages 57-72
Relational Analysis for Delivery of Services....Pages 73-89
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems....Pages 90-107
Type-Safe Distributed Programming with ML5....Pages 108-123
Transactional Service Level Agreement....Pages 124-139
On the Complexity of Termination Inference for Processes....Pages 140-155
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing....Pages 156-168
Access Control Based on Code Identity for Open Distributed Systems....Pages 169-185
Service Oriented Architectural Design....Pages 186-203
Replicating Web Services for Scalability....Pages 204-221
Location-Aware Quality of Service Measurements for Service-Level Agreements....Pages 222-239
Multipoint Session Types for a Distributed Calculus....Pages 240-256
On Progress for Structured Communications....Pages 257-275
A Protocol Compiler for Secure Sessions in ML....Pages 276-293
Application of Dependency Graphs to Security Protocol Analysis....Pages 294-311
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols....Pages 312-329
Anonymity Protocol with Identity Escrow and Analysis in the Applied π -Calculus....Pages 330-346
Formal Approaches to Information-Hiding (Tutorial)....Pages 347-362
Computational Soundness of Equational Theories (Tutorial)....Pages 363-382
Adversaries and Information Leaks (Tutorial)....Pages 383-400
Back Matter....Pages -