


default search action
TGC 2007: Sophia-Antipolis, France
- Gilles Barthe

, Cédric Fournet:
Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4912, Springer 2008, ISBN 978-3-540-78662-7
Invited Papers
- Martin Hofmann, Mariela Pavlova:

Elimination of Ghost Variables in Program Logics. 1-20 - Jeff Magee:

Web Service Composition: From Analysis to Autonomy. 21 - Karthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya:

Service Combinators for Farming Virtual Machines. 22
Accepted Papers
- Benjamin Grégoire, Jorge Luis Sacchini:

Combining a Verification Condition Generator for a Bytecode Language with Static Analyses. 23-40 - Pierre Crégut:

Extracting Control from Data: User Interfaces of MIDP Applications. 41-56 - Patryk Czarnik, Aleksy Schubert:

Extending Operational Semantics of the Java Bytecode. 57-72 - Flemming Nielson

, Hanne Riis Nielson
, Jörg Bauer, Christoffer Rosenkilde Nielsen, Henrik Pilegaard:
Relational Analysis for Delivery of Services. 73-89 - Luigi Liquori

, Michel Cosnard
:
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems. 90-107 - Tom Murphy VII, Karl Crary, Robert Harper:

Type-Safe Distributed Programming with ML5. 108-123 - Maria Grazia Buscemi, Hernán C. Melgratti:

Transactional Service Level Agreement. 124-139 - Romain Demangeon, Daniel Hirschkoff, Naoki Kobayashi

, Davide Sangiorgi:
On the Complexity of Termination Inference for Processes. 140-155 - Kurt Dietrich, Martin Pirker

, Tobias Vejda, Ronald Toegl, Thomas Winkler, Peter Lipp:
A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted Computing. 156-168 - Andrew Cirillo, James Riely

:
Access Control Based on Code Identity for Open Distributed Systems. 169-185 - Roberto Bruni

, Alberto Lluch-Lafuente
, Ugo Montanari, Emilio Tuosto:
Service Oriented Architectural Design. 186-203 - Mario Bravetti, Stephen Gilmore, Claudio Guidi, Mirco Tribastone

:
Replicating Web Services for Scalability. 204-221 - Ashok Argent-Katwala, Jeremy T. Bradley, Allan Clark, Stephen Gilmore:

Location-Aware Quality of Service Measurements for Service-Level Agreements. 222-239 - Eduardo Bonelli, Adriana B. Compagnoni:

Multipoint Session Types for a Distributed Calculus. 240-256 - Mariangiola Dezani-Ciancaglini

, Ugo de'Liguoro, Nobuko Yoshida
:
On Progress for Structured Communications. 257-275 - Ricardo Corin, Pierre-Malo Deniélou:

A Protocol Compiler for Secure Sessions in ML. 276-293 - Ilja Tsahhirov, Peeter Laud

:
Application of Dependency Graphs to Security Protocol Analysis. 294-311 - Arnab Roy, Anupam Datta, John C. Mitchell:

Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. 312-329 - Aybek Mukhamedov, Mark Dermot Ryan

:
Anonymity Protocol with Identity Escrow and Analysis in the Applied n-Calculus. 330-346
Tutorial Papers
- Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi

, Prakash Panangaden:
Formal Approaches to Information-Hiding (Tutorial). 347-362 - Steve Kremer:

Computational Soundness of Equational Theories (Tutorial). 363-382 - Geoffrey Smith:

Adversaries and Information Leaks (Tutorial). 383-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














