Logics and languages for reliability and security /:
Software-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logic...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
2010.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
v. 24. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Software-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness. |
Beschreibung: | 1 online resource (ix, 325 pages) : illustrations. |
Bibliographie: | Includes bibliographical reference and index. |
ISBN: | 9781607501008 1607501007 9781607500995 160750099X |
ISSN: | 1874-6268 ; |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn647184853 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 100713s2010 ne a ob 101 0 eng d | ||
010 | |a 2017394913 | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d EBLCP |d YDXCP |d OCLCQ |d MERUC |d OCLCF |d OCLCQ |d OCLCO |d DEBSZ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d N$T |d OCLCO |d OCLCQ |d AGLDB |d ICA |d ZCU |d OCLCQ |d U3W |d OCLCA |d D6H |d VTS |d ICG |d INT |d AU@ |d OCLCQ |d STF |d DKC |d OCLCQ |d M8D |d AJS |d HS0 |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d OCLCQ | ||
019 | |a 1058346205 |a 1228615939 | ||
020 | |a 9781607501008 |q (electronic bk.) | ||
020 | |a 1607501007 |q (electronic bk.) | ||
020 | |a 9781607500995 |q (hbk.) | ||
020 | |a 160750099X | ||
035 | |a (OCoLC)647184853 |z (OCoLC)1058346205 |z (OCoLC)1228615939 | ||
037 | |a 978-1-60750-100-8 |b IOS Press |n http://www.iospress.nl | ||
050 | 4 | |a QA76.76 | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 004 |2 22 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Study Institute on Logics and Languages for Reliability and Security |d (2009 : |c Marktoberdorf, Germany) | |
245 | 1 | 0 | |a Logics and languages for reliability and security / |c edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg. |
260 | |a Amsterdam : |b IOS Press, |c 2010. | ||
300 | |a 1 online resource (ix, 325 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security series. D, Information and communication security, |x 1874-6268 ; |v v. 24 | |
504 | |a Includes bibliographical reference and index. | ||
588 | 0 | |a Print version record. | |
520 | |a Software-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness. | ||
505 | 0 | |a Title page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata | |
505 | 8 | |a Implicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Computer logic |v Congresses. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Logique informatique |v Congrès. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Computer logic |2 fast | |
650 | 7 | |a Computer security |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Esparza, Javier. | |
700 | 1 | |a Spanfelner, Bernd. | |
700 | 1 | |a Grumberg, Orna. | |
710 | 2 | |a IOS Press. |0 http://id.loc.gov/authorities/names/no2015091156 | |
776 | 0 | 8 | |i Print version: |a NATO Advanced Study Institute on Logics and Languages for Reliability and Security (2009 : Marktoberdorf, Germany). |t Logics and languages for reliability and security. |d Amsterdam : IOS Press, 2010 |z 9781607500995 |z 160750099X |w (OCoLC)567148833 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v v. 24. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1361692 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL557042 | ||
938 | |a EBSCOhost |b EBSC |n 1361692 | ||
938 | |a YBP Library Services |b YANK |n 3379147 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn647184853 |
---|---|
_version_ | 1816881727338971136 |
adam_text | |
any_adam_object | |
author2 | Esparza, Javier Spanfelner, Bernd Grumberg, Orna |
author2_role | |
author2_variant | j e je b s bs o g og |
author_corporate | NATO Advanced Study Institute on Logics and Languages for Reliability and Security Marktoberdorf, Germany IOS Press |
author_corporate_role | |
author_facet | Esparza, Javier Spanfelner, Bernd Grumberg, Orna NATO Advanced Study Institute on Logics and Languages for Reliability and Security Marktoberdorf, Germany IOS Press |
author_sort | NATO Advanced Study Institute on Logics and Languages for Reliability and Security Marktoberdorf, Germany |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76 |
callnumber-search | QA76.76 |
callnumber-sort | QA 276.76 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata Implicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index |
ctrlnum | (OCoLC)647184853 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04620cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn647184853</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">100713s2010 ne a ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2017394913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">AJS</subfield><subfield code="d">HS0</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1058346205</subfield><subfield code="a">1228615939</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607501008</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607501007</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607500995</subfield><subfield code="q">(hbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">160750099X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)647184853</subfield><subfield code="z">(OCoLC)1058346205</subfield><subfield code="z">(OCoLC)1228615939</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-60750-100-8</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Logics and Languages for Reliability and Security</subfield><subfield code="d">(2009 :</subfield><subfield code="c">Marktoberdorf, Germany)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Logics and languages for reliability and security /</subfield><subfield code="c">edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 325 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series. D, Information and communication security,</subfield><subfield code="x">1874-6268 ;</subfield><subfield code="v">v. 24</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical reference and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Software-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Implicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer logic</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logique informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer logic</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Esparza, Javier.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Spanfelner, Bernd.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grumberg, Orna.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015091156</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">NATO Advanced Study Institute on Logics and Languages for Reliability and Security (2009 : Marktoberdorf, Germany).</subfield><subfield code="t">Logics and languages for reliability and security.</subfield><subfield code="d">Amsterdam : IOS Press, 2010</subfield><subfield code="z">9781607500995</subfield><subfield code="z">160750099X</subfield><subfield code="w">(OCoLC)567148833</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">v. 24.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1361692</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL557042</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1361692</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3379147</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn647184853 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:19Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/no2015091156 |
isbn | 9781607501008 1607501007 9781607500995 160750099X |
issn | 1874-6268 ; |
language | English |
lccn | 2017394913 |
oclc_num | 647184853 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 325 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO science for peace and security series. D, Information and communication security, |
spelling | NATO Advanced Study Institute on Logics and Languages for Reliability and Security (2009 : Marktoberdorf, Germany) Logics and languages for reliability and security / edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg. Amsterdam : IOS Press, 2010. 1 online resource (ix, 325 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security series. D, Information and communication security, 1874-6268 ; v. 24 Includes bibliographical reference and index. Print version record. Software-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness. Title page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata Implicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index Computer security Congresses. Computer logic Congresses. Sécurité informatique Congrès. Logique informatique Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer logic fast Computer security fast Conference papers and proceedings fast Esparza, Javier. Spanfelner, Bernd. Grumberg, Orna. IOS Press. http://id.loc.gov/authorities/names/no2015091156 Print version: NATO Advanced Study Institute on Logics and Languages for Reliability and Security (2009 : Marktoberdorf, Germany). Logics and languages for reliability and security. Amsterdam : IOS Press, 2010 9781607500995 160750099X (OCoLC)567148833 NATO science for peace and security series. Sub-series D, Information and communication security ; v. 24. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1361692 Volltext |
spellingShingle | Logics and languages for reliability and security / NATO science for peace and security series. Information and communication security ; Title page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata Implicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index Computer security Congresses. Computer logic Congresses. Sécurité informatique Congrès. Logique informatique Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer logic fast Computer security fast |
title | Logics and languages for reliability and security / |
title_auth | Logics and languages for reliability and security / |
title_exact_search | Logics and languages for reliability and security / |
title_full | Logics and languages for reliability and security / edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg. |
title_fullStr | Logics and languages for reliability and security / edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg. |
title_full_unstemmed | Logics and languages for reliability and security / edited by Javier Esparza, Bernd Spanfelner and Orna Grumberg. |
title_short | Logics and languages for reliability and security / |
title_sort | logics and languages for reliability and security |
topic | Computer security Congresses. Computer logic Congresses. Sécurité informatique Congrès. Logique informatique Congrès. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Computer logic fast Computer security fast |
topic_facet | Computer security Congresses. Computer logic Congresses. Sécurité informatique Congrès. Logique informatique Congrès. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Computer logic Computer security Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1361692 |
work_keys_str_mv | AT natoadvancedstudyinstituteonlogicsandlanguagesforreliabilityandsecuritymarktoberdorfgermany logicsandlanguagesforreliabilityandsecurity AT esparzajavier logicsandlanguagesforreliabilityandsecurity AT spanfelnerbernd logicsandlanguagesforreliabilityandsecurity AT grumbergorna logicsandlanguagesforreliabilityandsecurity AT iospress logicsandlanguagesforreliabilityandsecurity |