Trustworthy Global Computing

8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers

Conference proceedings TGC 2013
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8358)

Table of contents

  1. Front Matter
    Pages I-X
  2. Invited Papers

    1. Front Matter
      Pages 1-1
    2. Luca de Alfaro, Bo Adler
      Pages 3-13
    3. Nobuko Yoshida, Raymond Hu, Rumyana Neykova, Nicholas Ng
      Pages 22-41
  3. Security

    1. Front Matter
      Pages 43-43
    2. Shiwei Xu, Ian Batten, Mark Ryan
      Pages 45-63
    3. Dominic Duggan, Ye Wu
      Pages 64-79
  4. π-Calculus

    1. Front Matter
      Pages 81-81
    2. Hans Hüttel
      Pages 83-102
    3. Johannes Borgström, Ramūnas Gutkovas, Joachim Parrow, Björn Victor, Johannes Åman Pohjola
      Pages 103-118
    4. Neda Saeedloei, Gopal Gupta
      Pages 119-135
    5. Marco Giunti, António Ravara
      Pages 136-155
  5. Information Flow

    1. Front Matter
      Pages 157-157
    2. Pejman Attar, Ilaria Castellani
      Pages 159-179
    3. Pablo Buiras, Amit Levy, Deian Stefan, Alejandro Russo, David Mazières
      Pages 199-216
  6. Models, Specifications, and Proofs

    1. Front Matter
      Pages 217-217
    2. Serge Haddad, Rolf Hennicker, Mikael H. Møller
      Pages 219-234
    3. Andrea Corradini, Leila Ribeiro, Fernando Dotti, Odorico Mendizabal
      Pages 235-253

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 29 submissions. The papers cover a wide range of topics in the area of global computing and safe and reliable computation. They are organized in topical sections on security, π-calculus, information flow, models, specifications and proofs and quantitative analysis.

Keywords

computational complexity data security distributed systems formal methods hardware security information systems logic pi-calculus reliable computation

Editors and affiliations

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-05119-2
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-05118-5
  • Online ISBN 978-3-319-05119-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book