Trustworthy Global Computing: International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005. Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the International Symposium on Trustworthy Global Computing, TGC 2005, held in Edinburgh, UK, in April 2005, and colocated with the events of ETAPS 2005.

The 11 revised full papers presented together with 8 papers contributed by the invited speakers were carefully selected during 2 rounds of reviewing and improvement from numerous submissions. Topical issues covered by the workshop are resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, models of interaction and dynamic components management, language concepts and abstraction mechanisms, test generators, symbolic interpreters, type checkers, finite state model checkers, theorem provers, software principles to support debugging and verification.

Author(s): Benjamin C. Pierce (auth.), Rocco De Nicola, Davide Sangiorgi (eds.)
Series: Lecture Notes in Computer Science 3705 : Theoretical Computer Science and General Issues
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 371
Tags: Software Engineering; Computer Communication Networks; Programming Techniques; Operating Systems; Programming Languages, Compilers, Interpreters; Logics and Meanings of Programs

Front Matter....Pages -
Harmony: The Art of Reconciliation....Pages 1-1
A Theory of Noninterference for the π -Calculus....Pages 2-18
Typed Processes in Untyped Contexts....Pages 19-32
Model–Based Testing of Cryptographic Protocols....Pages 33-60
A General Name Binding Mechanism....Pages 61-74
Types for Security in a Mobile World....Pages 75-97
History-Based Access Control for Distributed Processes....Pages 98-115
Programming Cryptographic Protocols....Pages 116-145
A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange....Pages 146-162
A Formal Semantics for Protocol Narrations....Pages 163-181
web π at Work....Pages 182-194
Concurrency Among Strangers....Pages 195-229
The Modelling and Analysis of OceanStore Elements Using the CSP Dependability Library....Pages 230-247
A Practical Formal Model for Safety Analysis in Capability-Based Systems....Pages 248-278
Mixin Modules for Dynamic Rebinding....Pages 279-298
A Distributed Object-Oriented Language with Session Types....Pages 299-318
Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies....Pages 319-333
Automated Analysis of Infinite Scenarios....Pages 334-352
Namespace Logic: A Logic for a Reflective Higher-Order Calculus....Pages 353-369
Erratum....Pages E1-E1
Back Matter....Pages -