Abstract is missing.
- Elimination of Ghost Variables in Program LogicsMartin Hofmann, Mariela Pavlova. 1-20 [doi]
- Web Service Composition: From Analysis to AutonomyJeff Magee. 21 [doi]
- Service Combinators for Farming Virtual MachinesKarthikeyan Bhargavan, Andrew D. Gordon, Iman Narasamdya. 22 [doi]
- Combining a Verification Condition Generator for a Bytecode Language with Static AnalysesBenjamin Grégoire, Jorge Luis Sacchini. 23-40 [doi]
- Extracting Control from Data: User Interfaces of MIDP ApplicationsPierre Crégut. 41-56 [doi]
- Extending Operational Semantics of the Java BytecodePatryk Czarnik, Aleksy Schubert. 57-72 [doi]
- Relational Analysis for Delivery of ServicesFlemming Nielson, Hanne Riis Nielson, Jörg Bauer, Christoffer Rosenkilde Nielsen, Henrik Pilegaard. 73-89 [doi]
- Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing SystemsLuigi Liquori, Michel Cosnard. 90-107 [doi]
- Type-Safe Distributed Programming with ML5Tom Murphy VII, Karl Crary, Robert Harper. 108-123 [doi]
- Transactional Service Level AgreementMaria Grazia Buscemi, Hernán C. Melgratti. 124-139 [doi]
- On the Complexity of Termination Inference for ProcessesRomain Demangeon, Daniel Hirschkoff, Naoki Kobayashi, Davide Sangiorgi. 140-155 [doi]
- A Practical Approach for Establishing Trust Relationships between Remote Platforms Using Trusted ComputingKurt Dietrich, Martin Pirker, Tobias Vejda, Ronald Toegl, Thomas Winkler, Peter Lipp. 156-168 [doi]
- Access Control Based on Code Identity for Open Distributed SystemsAndrew Cirillo, James Riely. 169-185 [doi]
- Service Oriented Architectural DesignRoberto Bruni, Alberto Lluch-Lafuente, Ugo Montanari, Emilio Tuosto. 186-203 [doi]
- Replicating Web Services for ScalabilityMario Bravetti, Stephen Gilmore, Claudio Guidi, Mirco Tribastone. 204-221 [doi]
- Location-Aware Quality of Service Measurements for Service-Level AgreementsAshok Argent-Katwala, Jeremy T. Bradley, Allan Clark, Stephen Gilmore. 222-239 [doi]
- Multipoint Session Types for a Distributed CalculusEduardo Bonelli, Adriana B. Compagnoni. 240-256 [doi]
- On Progress for Structured CommunicationsMariangiola Dezani-Ciancaglini, Ugo de Liguoro, Nobuko Yoshida. 257-275 [doi]
- A Protocol Compiler for Secure Sessions in MLRicardo Corin, Pierre-Malo Deniélou. 276-293 [doi]
- Application of Dependency Graphs to Security Protocol AnalysisIlja Tsahhirov, Peeter Laud. 294-311 [doi]
- Formal Proofs of Cryptographic Security of Diffie-Hellman-Based ProtocolsArnab Roy, Anupam Datta, John C. Mitchell. 312-329 [doi]
- Anonymity Protocol with Identity Escrow and Analysis in the Applied n-CalculusAybek Mukhamedov, Mark Dermot Ryan. 330-346 [doi]
- Formal Approaches to Information-Hiding (Tutorial)Romain Beauxis, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Prakash Panangaden. 347-362 [doi]
- Computational Soundness of Equational Theories (Tutorial)Steve Kremer. 363-382 [doi]
- Adversaries and Information Leaks (Tutorial)Geoffrey Smith. 383-400 [doi]