The SCEAS System
Navigation Menu

Conferences in DBLP

Trustworthy Global Computing (tgc)
2005 (conf/tgc/2005)

  1. Benjamin C. Pierce
    Harmony: The Art of Reconciliation. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:1- [Conf]
  2. Silvia Crafa, Sabina Rossi
    A Theory of Noninterference for the pi-Calculus. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:2-18 [Conf]
  3. Michele Bugliesi, Marco Giunti
    Typed Processes in Untyped Contexts. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:19-32 [Conf]
  4. Dean Rosenzweig, Davor Runje, Wolfram Schulte
    Model-Based Testing of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:33-60 [Conf]
  5. Michele Boreale, Maria Grazia Buscemi, Ugo Montanari
    A General Name Binding Mechanism. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:61-74 [Conf]
  6. Adriana B. Compagnoni, Elsa L. Gunter
    Types for Security in a Mobile World. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:75-97 [Conf]
  7. Francisco Martins, Vasco Thudichum Vasconcelos
    History-Based Access Control for Distributed Processes. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:98-115 [Conf]
  8. Joshua D. Guttman, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen
    Programming Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:116-145 [Conf]
  9. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    A Framework for Analyzing Probabilistic Protocols and Its Application to the Partial Secrets Exchange. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:146-162 [Conf]
  10. Sébastien Briais, Uwe Nestmann
    A Formal Semantics for Protocol Narrations. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:163-181 [Conf]
  11. Cosimo Laneve, Gianluigi Zavattaro
    web-pi at Work. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:182-194 [Conf]
  12. Mark S. Miller, Eric Dean Tribble, Jonathan S. Shapiro
    Concurrency Among Strangers. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:195-229 [Conf]
  13. William Simmonds, Tim Hawkins
    The Modelling and Analysis of OceanStore Elements Using the CSP Dependability Library. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:230-247 [Conf]
  14. Fred Spiessens, Peter Van Roy
    A Practical Formal Model for Safety Analysis in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:248-278 [Conf]
  15. Davide Ancona, Sonia Fagorzi, Elena Zucca
    Mixin Modules for Dynamic Rebinding. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:279-298 [Conf]
  16. Mariangiola Dezani-Ciancaglini, Nobuko Yoshida, Alexander Ahern, Sophia Drossopoulou
    A Distributed Object-Oriented Language with Session Types. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:299-318 [Conf]
  17. James Skene, Wolfgang Emmerich
    Engineering Runtime Requirements-Monitoring Systems Using MDA Technologies. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:319-333 [Conf]
  18. Mikael Buchholtz
    Automated Analysis of Infinite Scenarios. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:334-352 [Conf]
  19. L. Gregory Meredith, Matthias Radestock
    Namespace Logic: A Logic for a Reflective Higher-Order Calculus. [Citation Graph (0, 0)][DBLP]
    TGC, 2005, pp:353-369 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002