A Protocol Compiler for Secure Sessions in ML
Distributed applications can be structured using sessions that specify flows of messages between roles. We design a small specific language to declare sessions. We then build a compiler, called s2ml , that transforms these declarations down to ML modules
- PDF / 7,601,067 Bytes
- 411 Pages / 430 x 660 pts Page_size
- 88 Downloads / 191 Views
Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
4912
Gilles Barthe Cédric Fournet (Eds.)
Trustworthy Global Computing Third Symposium, TGC 2007 Sophia-Antipolis, France, November 5-6, 2007 Revised Selected Papers
13
Volume Editors Gilles Barthe INRIA Sophia-Antipolis Méditerranée 2004 route des lucioles - BP 93, 06902 Sophia Antipolis Cedex, France E-mail: [email protected] Cédric Fournet Microsoft Research Ltd. 7 J J Thomson Avenue, Cambridge CB3 0FB, UK E-mail: [email protected]
Library of Congress Control Number: 2008922366 CR Subject Classification (1998): C.2.4, D.1.3, D.2, D.4.6, F.2.1-2, D.3, F.3 LNCS Sublibrary: SL 1 – Theoretical Computer Science and General Issues ISSN ISBN-10 ISBN-13
0302-9743 3-540-78662-7 Springer Berlin Heidelberg New York 978-3-540-78662-7 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2008 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12241507 06/3180 543210
Preface
This volume contains the post-proceedings of the third edition of the International Symposium on Trustworthy Global Computing (TGC 2007), held in Sophia-Antipolis, France, November 5–6, 2007, and tutorial papers of the following Workshop on the Interplay of Programming Languages and Cryptography, held in Sophia Antipolis, November 7, 2007. The Symposium on Trustworthy Global Computing is an international annual venue dedicated to safe and reliable computation in global computers. It focuses on providing tools and frameworks for constructing well-be
Data Loading...