Trustworthy Global Computing: Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

Front Cover
Springer Science & Business Media, Mar 18, 2008 - Computers - 400 pages
This volume contains the post-proceedings of the third edition of the Int- national Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis, France, November 5-6,2007, andtutorialpapersofthe foll- ing Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. TheSymposiumonTrustworthyGlobalComputingisaninternationalannual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-behaved applications and for reasoning about their behavior and properties in models of computation that incorporate code and data mobility over distributed networks with highly dynamic topologies and heterogeneous devices. This volume starts with an invited paper from Martin Hofmann. It then - cludes the revised versions of the 19 contributed papers; these versions take into accountboth the referee's reports andthe discussions that took place during the symposium. The Program Committee selected 19 papers from 48 submissions. Every submission was reviewed by at least three members of the ProgramC- mittee. In addition, the Program Committee sought the opinions of additional referees, selected because of their expertise on particular topics. We are grateful to Andrei Voronkov for his EasyChair system that helped us to manage these discussions. We would like to thank the authors who submitted papers to the conference, the members of the ProgramCommittee, and the additional revi- ers for their excellent work. We would also like to thank the invited speakers to TGC 2007, Andrew D. Gordon, Martin Hofmann, and Je? Magee.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Elimination of Ghost Variables in Program Logics
1
From Analysis to Autonomy
21
Service Combinators for Farming Virtual Machines
22
Combining a Verification Condition Generator for a Bytecode Language with Static Analyses
23
User Interfaces of MIDP Applications
41
Extending Operational Semantics of the Java Bytecode
57
Relational Analysis for Delivery of Services
73
Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
90
Replicating Web Services for Scalability
204
LocationAware Quality of Service Measurements for ServiceLevel Agreements
222
Multipoint Session Types for a Distributed Calculus
240
On Progress for Structured Communications
257
A Protocol Compiler for Secure Sessions in ML
276
Application of Dependency Graphs to Security Protocol Analysis
294
Formal Proofs of Cryptographic Security of DiffieHellmanBased Protocols
312
Anonymity Protocol with Identity Escrow and Analysis in the Applied πCalculus
330

TypeSafe Distributed Programming with ML5
108
Transactional Service Level Agreement
124
On the Complexity of Termination Inference for Processes
140
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing
156
Access Control Based on Code Identity for Open Distributed Systems
169
Service Oriented Architectural Design
186
Formal Approaches to InformationHiding
347
Computational Soundness of Equational Theories
363
Adversaries and Information Leaks
383
Author Index
401
Copyright

Other editions - View all

Common terms and phrases