Software and systems safety: specification and verification
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
IOS Press
2011
|
Schriftenreihe: | NATO science for peace and security series
v. 30 |
Schlagworte: | |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso Print version record |
Beschreibung: | 1 online resource (296 pages) |
ISBN: | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV045349349 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2011 xx o|||| 00||| eng d | ||
020 | |a 9781607507116 |9 978-1-60750-711-6 | ||
020 | |a 1607507110 |9 1-60750-711-0 | ||
020 | |a 9781607507109 |9 978-1-60750-710-9 | ||
020 | |a 1607507102 |9 1-60750-710-2 | ||
020 | |a 1283289601 |9 1-283-28960-1 | ||
020 | |a 9781283289603 |9 978-1-283-28960-3 | ||
035 | |a (ZDB-4-ITC)ocn756484723 | ||
035 | |a (OCoLC)756484723 | ||
035 | |a (DE-599)BVBBV045349349 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.10289 | |
110 | 2 | |a NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |e Verfasser |4 aut | |
245 | 1 | 0 | |a Software and systems safety |b specification and verification |c edited by Manfred Broy, Christian Leuxner and Tony Hoare |
264 | 1 | |a Amsterdam |b IOS Press |c 2011 | |
300 | |a 1 online resource (296 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a NATO science for peace and security series |v v. 30 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso | ||
500 | |a Print version record | ||
505 | 8 | |a Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance | |
650 | 7 | |a COMPUTERS / Programming / Open Source |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / Tools |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software / Verification |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
650 | 4 | |a Computer software |x Verification |v Congresses |a Software engineering |v Congresses |a Computer security |v Congresses | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Broy, M. |d 1949- |4 edt | |
700 | 1 | |a Leuxner, Christian |4 edt | |
700 | 1 | |a Hoare, C. A. R. |d 1934- |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Broy, M. |t Software and Systems Safety : Specification and Verification |d Amsterdam : IOS Press, 2011 |z 9781607507109 |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-4-ITC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030736000 |
Datensatz im Suchindex
_version_ | 1820868261076533248 |
---|---|
adam_text | |
any_adam_object | |
author2 | Broy, M. 1949- Leuxner, Christian Hoare, C. A. R. 1934- |
author2_role | edt edt edt |
author2_variant | m b mb c l cl c a r h car carh |
author_corporate | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
author_corporate_role | aut |
author_facet | Broy, M. 1949- Leuxner, Christian Hoare, C. A. R. 1934- NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
author_sort | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> |
building | Verbundindex |
bvnumber | BV045349349 |
classification_rvk | SS 2010 |
collection | ZDB-4-ITC |
contents | Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance |
ctrlnum | (ZDB-4-ITC)ocn756484723 (OCoLC)756484723 (DE-599)BVBBV045349349 |
dewey-full | 005.10289 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.10289 |
dewey-search | 005.10289 |
dewey-sort | 15.10289 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV045349349</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2011 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507116</subfield><subfield code="9">978-1-60750-711-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507110</subfield><subfield code="9">1-60750-711-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507109</subfield><subfield code="9">978-1-60750-710-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507102</subfield><subfield code="9">1-60750-710-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283289601</subfield><subfield code="9">1-283-28960-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283289603</subfield><subfield code="9">978-1-283-28960-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn756484723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)756484723</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349349</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.10289</subfield></datafield><datafield tag="110" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany></subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software and systems safety</subfield><subfield code="b">specification and verification</subfield><subfield code="c">edited by Manfred Broy, Christian Leuxner and Tony Hoare</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (296 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NATO science for peace and security series</subfield><subfield code="v">v. 30</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Programming / Open Source</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / Tools</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software / Verification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="v">Congresses</subfield><subfield code="a">Software engineering</subfield><subfield code="v">Congresses</subfield><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Broy, M.</subfield><subfield code="d">1949-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leuxner, Christian</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoare, C. A. R.</subfield><subfield code="d">1934-</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Broy, M.</subfield><subfield code="t">Software and Systems Safety : Specification and Verification</subfield><subfield code="d">Amsterdam : IOS Press, 2011</subfield><subfield code="z">9781607507109</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736000</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift gnd-content |
genre_facet | Konferenzschrift |
id | DE-604.BV045349349 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T13:21:33Z |
institution | BVB |
isbn | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736000 |
oclc_num | 756484723 |
open_access_boolean | |
physical | 1 online resource (296 pages) |
psigel | ZDB-4-ITC |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press |
record_format | marc |
series2 | NATO science for peace and security series |
spelling | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification <2010, Marktoberdorf, Germany> Verfasser aut Software and systems safety specification and verification edited by Manfred Broy, Christian Leuxner and Tony Hoare Amsterdam IOS Press 2011 1 online resource (296 pages) txt rdacontent c rdamedia cr rdacarrier NATO science for peace and security series v. 30 "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso Print version record Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift gnd-content Sicherheitskritisches System (DE-588)4767762-4 s Computersicherheit (DE-588)4274324-2 s 2\p DE-604 Broy, M. 1949- edt Leuxner, Christian edt Hoare, C. A. R. 1934- edt Erscheint auch als Druck-Ausgabe Broy, M. Software and Systems Safety : Specification and Verification Amsterdam : IOS Press, 2011 9781607507109 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Software and systems safety specification and verification Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4767762-4 (DE-588)1071861417 |
title | Software and systems safety specification and verification |
title_auth | Software and systems safety specification and verification |
title_exact_search | Software and systems safety specification and verification |
title_full | Software and systems safety specification and verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_fullStr | Software and systems safety specification and verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_full_unstemmed | Software and systems safety specification and verification edited by Manfred Broy, Christian Leuxner and Tony Hoare |
title_short | Software and systems safety |
title_sort | software and systems safety specification and verification |
title_sub | specification and verification |
topic | COMPUTERS / Programming / Open Source bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Software Development & Engineering / Tools bisacsh Computer security fast Computer software / Verification fast Software engineering fast Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit (DE-588)4274324-2 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
topic_facet | COMPUTERS / Programming / Open Source COMPUTERS / Software Development & Engineering / General COMPUTERS / Software Development & Engineering / Tools Computer security Computer software / Verification Software engineering Computer software Verification Congresses Software engineering Congresses Computer security Congresses Computersicherheit Sicherheitskritisches System Konferenzschrift |
work_keys_str_mv | AT natoadvancedstudyinstituteonsoftwareandsystemssafetyspecificationandverification2010marktoberdorfgermany softwareandsystemssafetyspecificationandverification AT broym softwareandsystemssafetyspecificationandverification AT leuxnerchristian softwareandsystemssafetyspecificationandverification AT hoarecar softwareandsystemssafetyspecificationandverification |