Software safety and security :: tools for analysis and verification /
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been somethi...
Gespeichert in:
Körperschaften: | , |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, D.C. :
IOS Press,
©2012.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
v. 33. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs. Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems. |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security, Bayrischzell, Germany, 2-14 August 2011"--Title page verso. International conference proceedings. Includes indexes. |
Beschreibung: | 1 online resource : illustrations. |
Bibliographie: | Includes bibliographical references and indexes. |
ISBN: | 9781614990284 161499028X 1280875909 9781280875908 9781614990277 1614990271 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn796813034 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120626s2012 ne a ob 101 0 eng d | ||
040 | |a IOSPR |b eng |e pn |c IOSPR |d N$T |d IDEBK |d UKMGB |d OCLCQ |d YDXCP |d OCLCQ |d OCLCF |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d AGLDB |d OCLCQ |d U3W |d OCLCA |d OCLCQ |d VTS |d COCUF |d INT |d OCLCQ |d VT2 |d OCLCQ |d STF |d M8D |d HS0 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ | ||
016 | 7 | |a 016121553 |2 Uk | |
019 | |a 798209603 |a 817095532 |a 1081201487 | ||
020 | |a 9781614990284 |q (electronic bk.) | ||
020 | |a 161499028X |q (electronic bk.) | ||
020 | |a 1280875909 | ||
020 | |a 9781280875908 | ||
020 | |a 9781614990277 | ||
020 | |a 1614990271 | ||
035 | |a (OCoLC)796813034 |z (OCoLC)798209603 |z (OCoLC)817095532 |z (OCoLC)1081201487 | ||
050 | 4 | |a QA76.76.V47 |b N38 2012eb | |
072 | 7 | |a COM |x 051330 |2 bisacsh | |
082 | 7 | |a 005.1/4 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security |d (2011 : |c Bayrischzell, Germany) |0 http://id.loc.gov/authorities/names/nb2013008258 | |
245 | 1 | 0 | |a Software safety and security : |b tools for analysis and verification / |c edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann. |
260 | |a Amsterdam ; |a Washington, D.C. : |b IOS Press, |c ©2012. | ||
300 | |a 1 online resource : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security series. D, Information and communication security ; |v v. 33 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security, Bayrischzell, Germany, 2-14 August 2011"--Title page verso. | ||
500 | |a International conference proceedings. | ||
500 | |a Includes indexes. | ||
520 | |a Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs. Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems. | ||
504 | |a Includes bibliographical references and indexes. | ||
505 | 0 | |a SOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control | |
505 | 8 | |a Precise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index | |
650 | 0 | |a Computer software |x Verification |v Congresses. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 6 | |a Logiciels |x Vérification |v Congrès. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 7 | |a COMPUTERS |x Software Development & Engineering |x Quality Assurance & Testing. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software |x Verification |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Nipkow, Tobias, |d 1958- |1 https://id.oclc.org/worldcat/entity/E39PBJyCHdbvXkv9XQQHrcYHG3 |0 http://id.loc.gov/authorities/names/n94038896 | |
700 | 1 | |a Grumberg, Orna. |0 http://id.loc.gov/authorities/names/nb97057888 | |
700 | 1 | |a Hauptmann, Benedikt. | |
710 | 2 | |a IOS Press (Firm) | |
758 | |i has work: |a Software safety and security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFDXkJgv9gyRFT8RfKrWH3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany). |t Software safety and security. |d Amsterdam ; Washington, D.C. : IOS Press, ©2012 |w (DLC) 2012937823 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v v. 33. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=463799 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 463799 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 371721 | ||
938 | |a YBP Library Services |b YANK |n 8923755 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn796813034 |
---|---|
_version_ | 1816881800078688256 |
adam_text | |
any_adam_object | |
author2 | Nipkow, Tobias, 1958- Grumberg, Orna Hauptmann, Benedikt |
author2_role | |
author2_variant | t n tn o g og b h bh |
author_GND | http://id.loc.gov/authorities/names/n94038896 http://id.loc.gov/authorities/names/nb97057888 |
author_corporate | NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security Bayrischzell, Germany IOS Press (Firm) |
author_corporate_role | |
author_facet | Nipkow, Tobias, 1958- Grumberg, Orna Hauptmann, Benedikt NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security Bayrischzell, Germany IOS Press (Firm) |
author_sort | NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security Bayrischzell, Germany |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.V47 N38 2012eb |
callnumber-search | QA76.76.V47 N38 2012eb |
callnumber-sort | QA 276.76 V47 N38 42012EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | SOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control Precise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index |
ctrlnum | (OCoLC)796813034 |
dewey-full | 005.1/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1/4 |
dewey-search | 005.1/4 |
dewey-sort | 15.1 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05719cam a2200685 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn796813034</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">120626s2012 ne a ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IOSPR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">COCUF</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016121553</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">798209603</subfield><subfield code="a">817095532</subfield><subfield code="a">1081201487</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614990284</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">161499028X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280875909</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280875908</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614990277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614990271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796813034</subfield><subfield code="z">(OCoLC)798209603</subfield><subfield code="z">(OCoLC)817095532</subfield><subfield code="z">(OCoLC)1081201487</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.V47</subfield><subfield code="b">N38 2012eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051330</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.1/4</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security</subfield><subfield code="d">(2011 :</subfield><subfield code="c">Bayrischzell, Germany)</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2013008258</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software safety and security :</subfield><subfield code="b">tools for analysis and verification /</subfield><subfield code="c">edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, D.C. :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series. D, Information and communication security ;</subfield><subfield code="v">v. 33</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security, Bayrischzell, Germany, 2-14 August 2011"--Title page verso.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">International conference proceedings.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs. Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">SOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Precise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Vérification</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Software Development & Engineering</subfield><subfield code="x">Quality Assurance & Testing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nipkow, Tobias,</subfield><subfield code="d">1958-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJyCHdbvXkv9XQQHrcYHG3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94038896</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grumberg, Orna.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb97057888</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hauptmann, Benedikt.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IOS Press (Firm)</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Software safety and security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFDXkJgv9gyRFT8RfKrWH3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany).</subfield><subfield code="t">Software safety and security.</subfield><subfield code="d">Amsterdam ; Washington, D.C. : IOS Press, ©2012</subfield><subfield code="w">(DLC) 2012937823</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">v. 33.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=463799</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">463799</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">371721</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">8923755</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn796813034 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:18:28Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/nb2013008258 |
isbn | 9781614990284 161499028X 1280875909 9781280875908 9781614990277 1614990271 |
language | English |
oclc_num | 796813034 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO science for peace and security series. D, Information and communication security ; |
spelling | NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany) http://id.loc.gov/authorities/names/nb2013008258 Software safety and security : tools for analysis and verification / edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann. Amsterdam ; Washington, D.C. : IOS Press, ©2012. 1 online resource : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security series. D, Information and communication security ; v. 33 "Proceedings of the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security, Bayrischzell, Germany, 2-14 August 2011"--Title page verso. International conference proceedings. Includes indexes. Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs. Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems. Includes bibliographical references and indexes. SOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control Precise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index Computer software Verification Congresses. Computer security Congresses. Logiciels Vérification Congrès. Sécurité informatique Congrès. COMPUTERS Software Development & Engineering Quality Assurance & Testing. bisacsh Computer security fast Computer software Verification fast Conference papers and proceedings fast Nipkow, Tobias, 1958- https://id.oclc.org/worldcat/entity/E39PBJyCHdbvXkv9XQQHrcYHG3 http://id.loc.gov/authorities/names/n94038896 Grumberg, Orna. http://id.loc.gov/authorities/names/nb97057888 Hauptmann, Benedikt. IOS Press (Firm) has work: Software safety and security (Text) https://id.oclc.org/worldcat/entity/E39PCFDXkJgv9gyRFT8RfKrWH3 https://id.oclc.org/worldcat/ontology/hasWork Print version: NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security (2011 : Bayrischzell, Germany). Software safety and security. Amsterdam ; Washington, D.C. : IOS Press, ©2012 (DLC) 2012937823 NATO science for peace and security series. Sub-series D, Information and communication security ; v. 33. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=463799 Volltext |
spellingShingle | Software safety and security : tools for analysis and verification / NATO science for peace and security series. Information and communication security ; SOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control Precise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index Computer software Verification Congresses. Computer security Congresses. Logiciels Vérification Congrès. Sécurité informatique Congrès. COMPUTERS Software Development & Engineering Quality Assurance & Testing. bisacsh Computer security fast Computer software Verification fast |
title | Software safety and security : tools for analysis and verification / |
title_auth | Software safety and security : tools for analysis and verification / |
title_exact_search | Software safety and security : tools for analysis and verification / |
title_full | Software safety and security : tools for analysis and verification / edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann. |
title_fullStr | Software safety and security : tools for analysis and verification / edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann. |
title_full_unstemmed | Software safety and security : tools for analysis and verification / edited by Tobias Nipkow, Orna Grumberg, and Benedikt Hauptmann. |
title_short | Software safety and security : |
title_sort | software safety and security tools for analysis and verification |
title_sub | tools for analysis and verification / |
topic | Computer software Verification Congresses. Computer security Congresses. Logiciels Vérification Congrès. Sécurité informatique Congrès. COMPUTERS Software Development & Engineering Quality Assurance & Testing. bisacsh Computer security fast Computer software Verification fast |
topic_facet | Computer software Verification Congresses. Computer security Congresses. Logiciels Vérification Congrès. Sécurité informatique Congrès. COMPUTERS Software Development & Engineering Quality Assurance & Testing. Computer security Computer software Verification Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=463799 |
work_keys_str_mv | AT natoadvancedstudyinstituteontoolsforanalysisandverificationofsoftwaresafetyandsecuritybayrischzellgermany softwaresafetyandsecuritytoolsforanalysisandverification AT nipkowtobias softwaresafetyandsecuritytoolsforanalysisandverification AT grumbergorna softwaresafetyandsecuritytoolsforanalysisandverification AT hauptmannbenedikt softwaresafetyandsecuritytoolsforanalysisandverification AT iospressfirm softwaresafetyandsecuritytoolsforanalysisandverification |