Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, and more.
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, lang...