


Остановите войну!
for scientists:


default search action
TGC 2007: Sophia-Antipolis, France
- Gilles Barthe
, Cédric Fournet:
Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4912, Springer 2008, ISBN 978-3-540-78662-7
Invited Papers
- Martin Hofmann, Mariela Pavlova:
Elimination of Ghost Variables in Program Logics. 1-20 - Jeff Magee:
Web Service Composition: From Analysis to Autonomy. 21 - Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya:
Service Combinators for Farming Virtual Machines. 22
Accepted Papers
- Benjamin Grégoire, Jorge Luis Sacchini:
Combining a Verification Condition Generator for a Bytecode Language with Static Analyses. 23-40 - Pierre Crégut:
Extracting Control from Data: User Interfaces of MIDP Applications. 41-56 - Patryk Czarnik, Aleksy Schubert:
Extending Operational Semantics of the Java Bytecode. 57-72 - Flemming Nielson
, Hanne Riis Nielson
, Jörg Bauer, Christoffer Rosenkilde Nielsen, Henrik Pilegaard:
Relational Analysis for Delivery of Services. 73-89 - Luigi Liquori
, Michel Cosnard:
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems. 90-107 - Tom Murphy VII, Karl Crary, Robert Harper:
Type-Safe Distributed Programming with ML5. 108-123 - Maria Grazia Buscemi, Hernán C. Melgratti:
Transactional Service Level Agreement. 124-139 - Romain Demangeon, Daniel Hirschkoff, Naoki Kobayashi
, Davide Sangiorgi:
On the Complexity of Termination Inference for Processes. 140-155 - Kurt Dietrich, Martin Pirker
, Tobias Vejda, Ronald Toegl, Thomas Winkler, Peter Lipp:
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. 156-168 - Andrew Cirillo, James Riely
:
Access Control Based on Code Identity for Open Distributed Systems. 169-185 - Roberto Bruni
, Alberto Lluch-Lafuente
, Ugo Montanari, Emilio Tuosto:
Service Oriented Architectural Design. 186-203 - Mario Bravetti, Stephen Gilmore, Claudio Guidi, Mirco Tribastone
:
Replicating Web Services for Scalability. 204-221 - Ashok Argent-Katwala, Jeremy T. Bradley, Allan Clark, Stephen Gilmore:
Location-Aware Quality of Service Measurements for Service-Level Agreements. 222-239 - Eduardo Bonelli, Adriana B. Compagnoni:
Multipoint Session Types for a Distributed Calculus. 240-256 - Mariangiola Dezani-Ciancaglini
, Ugo de'Liguoro, Nobuko Yoshida
:
On Progress for Structured Communications. 257-275 - Ricardo Corin, Pierre-Malo Deniélou:
A Protocol Compiler for Secure Sessions in ML. 276-293 - Ilja Tsahhirov, Peeter Laud
:
Application of Dependency Graphs to Security Protocol Analysis. 294-311 - Arnab Roy, Anupam Datta, John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. 312-329 - Aybek Mukhamedov, Mark Dermot Ryan
:
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. 330-346
Tutorial Papers
- Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi
, Prakash Panangaden:
Formal Approaches to Information-Hiding (Tutorial). 347-362 - Steve Kremer:
Computational Soundness of Equational Theories (Tutorial). 363-382 - Geoffrey Smith:
Adversaries and Information Leaks (Tutorial). 383-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.