Trustworthy Global Computing : International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005 (Lecture Notes in Computer Science) (REVISED)

個数:

Trustworthy Global Computing : International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005 (Lecture Notes in Computer Science) (REVISED)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 369 p.
  • 言語 ENG
  • 商品コード 9783540300076
  • DDC分類 005.8

Full Description

Computing technology has become ubiquitous, from global applications to - nuscule embedded devices. Trust in computing is vital to help protect public safety,nationalsecurity,andeconomicprosperity.Anewareaofresearch,known as global computing, has recently emerged that aims at de?ning new models of computation based on code and data mobility over wide area networks with highly dynamic topologies, and that aims at providing infrastructures to s- port coordination and control ofcomponents originatig n fromdi?erent,possibly untrusted, sources.Trustworthyglobalcomputing aims at guaranteeingsafe and reliable network usage, also by providing tools and framework for reasoning about behavior and properties of applications. AnInternationalSymposiumonTrustworthyGlobalComputing(TGC2005), was held in Edinburgh, UK, April 7-9, 2005.
The symposium contained pres- tations and discussions dealing with issues such as: - resource usage, - language-based security, - theories of trust and authentication, - privacy, reliability and business integrity, - access control and mechanisms for enforcing it, - models of interaction and dynamic components management, - language concepts and abstraction mechanisms, - test generators, symbolic interpreters, type checkers, - ?nite state model checkers, theorem provers, - software principles to support debugging and veri?cation.

Contents

Harmony: The Art of Reconciliation.- A Theory of Noninterference for the ?-Calculus.- Typed Processes in Untyped Contexts.- Model-Based Testing of Cryptographic Protocols.- A General Name Binding Mechanism.- Types for Security in a Mobile World.- History-Based Access Control for Distributed Processes.- Programming Cryptographic Protocols.- A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange.- A Formal Semantics for Protocol Narrations.- web ? at Work.- Concurrency Among Strangers.- The Modelling and Analysis of OceanStore Elements Using the CSP Dependability Library.- A Practical Formal Model for Safety Analysis in Capability-Based Systems.- Mixin Modules for Dynamic Rebinding.- A Distributed Object-Oriented Language with Session Types.- Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies.- Automated Analysis of Infinite Scenarios.- Namespace Logic: A Logic for a Reflective Higher-Order Calculus.- Erratum.