Software and Systems Safety: Specification and Verification
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
2011
|
Schriftenreihe: | NATO science for peace and security series
v. 30 |
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. - International conference proceedings. - Includes index Title; Preface; Contents; Model-Based Testing; Towards a Theory of Architectural Contracts: Schemes and Patterns of Assumption/Promise Based System Specification; Engineering Evolving and Self-Adaptive Systems: An Overview; Formal Verification; Requirements Models for Critical Systems; From Concurrency Models to Numbers: Performance and Dependability; Unifying Models of Data Flow; Model-Based Verification and Analysis for Real-Time Systems; Model Checking; Subject Index; Author Index Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Speci |
Beschreibung: | 1 Online-Ressource (296 pages) |
ISBN: | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV042970268 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151030s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781607507116 |c electronic bk. |9 978-1-60750-711-6 | ||
020 | |a 1607507110 |c electronic bk. |9 1-60750-711-0 | ||
020 | |a 9781607507109 |9 978-1-60750-710-9 | ||
020 | |a 1607507102 |9 1-60750-710-2 | ||
020 | |a 1283289601 |9 1-283-28960-1 | ||
020 | |a 9781283289603 |9 978-1-283-28960-3 | ||
035 | |a (OCoLC)756484723 | ||
035 | |a (DE-599)BVBBV042970268 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.10289 | |
110 | 2 | |a NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Software and Systems Safety |b Specification and Verification |c edited by Manfred Broy, Christian Leuxner and Tony Hoare |
264 | 1 | |a Amsterdam |b IOS Press |c 2011 | |
300 | |a 1 Online-Ressource (296 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v v. 30 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. - International conference proceedings. - Includes index | ||
500 | |a Title; Preface; Contents; Model-Based Testing; Towards a Theory of Architectural Contracts: Schemes and Patterns of Assumption/Promise Based System Specification; Engineering Evolving and Self-Adaptive Systems: An Overview; Formal Verification; Requirements Models for Critical Systems; From Concurrency Models to Numbers: Performance and Dependability; Unifying Models of Data Flow; Model-Based Verification and Analysis for Real-Time Systems; Model Checking; Subject Index; Author Index | ||
500 | |a Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Speci | ||
650 | 4 | |a Business logistics | |
650 | 4 | |a Computer science | |
650 | 7 | |a COMPUTERS / Programming / Open Source |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / Tools |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software / Verification |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Computer software |x Verification |v Congresses | |
650 | 4 | |a Software engineering |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Broy, M. |e Sonstige |4 oth | |
700 | 1 | |a Hoare, T. |e Sonstige |4 oth | |
700 | 1 | |a Leuxner, C. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=395230 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA |a ZDB-4-EBU | ||
940 | 1 | |q FAW_PDA_EBA | |
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028396134 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804175300233265152 |
---|---|
any_adam_object | |
author_corporate | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
author_corporate_role | aut |
author_facet | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
author_sort | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
building | Verbundindex |
bvnumber | BV042970268 |
collection | ZDB-4-EBA ZDB-4-EBU |
ctrlnum | (OCoLC)756484723 (DE-599)BVBBV042970268 |
dewey-full | 005.10289 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.10289 |
dewey-search | 005.10289 |
dewey-sort | 15.10289 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04038nmm a2200685zcb4500</leader><controlfield tag="001">BV042970268</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151030s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507116</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60750-711-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507110</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60750-711-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507109</subfield><subfield code="9">978-1-60750-710-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507102</subfield><subfield code="9">1-60750-710-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283289601</subfield><subfield code="9">1-283-28960-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283289603</subfield><subfield code="9">978-1-283-28960-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)756484723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042970268</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.10289</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software and Systems Safety</subfield><subfield code="b">Specification and Verification</subfield><subfield code="c">edited by Manfred Broy, Christian Leuxner and Tony Hoare</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (296 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">v. 30</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. - International conference proceedings. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title; Preface; Contents; Model-Based Testing; Towards a Theory of Architectural Contracts: Schemes and Patterns of Assumption/Promise Based System Specification; Engineering Evolving and Self-Adaptive Systems: An Overview; Formal Verification; Requirements Models for Critical Systems; From Concurrency Models to Numbers: Performance and Dependability; Unifying Models of Data Flow; Model-Based Verification and Analysis for Real-Time Systems; Model Checking; Subject Index; Author Index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Speci</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business logistics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Open Source</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / Tools</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software / Verification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Broy, M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoare, T.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leuxner, C.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=395230</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_EBA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028396134</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV042970268 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:14:06Z |
institution | BVB |
isbn | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028396134 |
oclc_num | 756484723 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (296 pages) |
psigel | ZDB-4-EBA ZDB-4-EBU FAW_PDA_EBA FLA_PDA_EBU |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> Verfasser aut Software and Systems Safety Specification and Verification edited by Manfred Broy, Christian Leuxner and Tony Hoare Amsterdam IOS Press 2011 1 Online-Ressource (296 pages) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series v. 30 "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. - International conference proceedings. - Includes index Title; Preface; Contents; Model-Based Testing; Towards a Theory of Architectural Contracts: Schemes and Patterns of Assumption/Promise Based System Specification; Engineering Evolving and Self-Adaptive Systems: An Overview; Formal Verification; Requirements Models for Critical Systems; From Concurrency Models to Numbers: Performance and Dependability; Unifying Models of Data Flow; Model-Based Verification and Analysis for Real-Time Systems; Model Checking; Subject Index; Author Index Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Speci Business logistics Computer science COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Informatik Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift gnd-content Sicherheitskritisches System (DE-588)4767762-4 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Broy, M. Sonstige oth Hoare, T. Sonstige oth Leuxner, C. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=395230 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Software and Systems Safety Specification and Verification Business logistics Computer science COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Informatik Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4767762-4 (DE-588)1071861417 |
title | Software and Systems Safety Specification and Verification |
title_auth | Software and Systems Safety Specification and Verification |
title_exact_search | Software and Systems Safety Specification and Verification |
title_full | Software and Systems Safety Specification and Verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_fullStr | Software and Systems Safety Specification and Verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_full_unstemmed | Software and Systems Safety Specification and Verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_short | Software and Systems Safety |
title_sort | software and systems safety specification and verification |
title_sub | Specification and Verification |
topic | Business logistics Computer science COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Informatik Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
topic_facet | Business logistics Computer science COMPUTERS / Programming / Open Source COMPUTERS / Software Development & Engineering / General COMPUTERS / Software Development & Engineering / Tools Computer security Computer software / Verification Software engineering Informatik Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit Sicherheitskritisches System Konferenzschrift |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=395230 |
work_keys_str_mv | AT natoadvancedstudyinstituteonsoftwareandsystemssafetyspecificationandverification2010marktoberdorfgermany softwareandsystemssafetyspecificationandverification AT broym softwareandsystemssafetyspecificationandverification AT hoaret softwareandsystemssafetyspecificationandverification AT leuxnerc softwareandsystemssafetyspecificationandverification |