Dependable software systems engineering /:
In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have d...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam, Netherlands :
IOS Press,
2016.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
vol. 45. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 - 'Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents - combinatorics; and analysis of synthesis with 'Big Code'. The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security. |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany, 4-16 August 2015." Includes indexes. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references at the end of each chapters and indexes. |
ISBN: | 9781614996279 161499627X 1614996261 9781614996262 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn949930457 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 160519s2016 ne ob 101 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d IDEBK |d IOSPR |d OCLCO |d EBLCP |d BTCTA |d OCLCF |d OCLCO |d YDXCP |d N$T |d OCLCO |d DEBSZ |d CCO |d COCUF |d LOA |d K6U |d STF |d AGLDB |d ICA |d PIFAG |d FVL |d OCLCQ |d MERUC |d OCLCQ |d ZCU |d U3W |d OCLCA |d D6H |d WRM |d OCLCQ |d VTS |d EZ9 |d ICG |d VT2 |d OCLCQ |d WYU |d TKN |d DKC |d OCLCQ |d M8D |d OCLCQ |d AJS |d SFB |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 950055579 |a 951221884 |a 1055359815 |a 1066457354 |a 1081206824 |a 1228549175 |a 1259180161 | ||
020 | |a 9781614996279 |q (electronic bk.) | ||
020 | |a 161499627X |q (electronic bk.) | ||
020 | |a 1614996261 | ||
020 | |a 9781614996262 | ||
020 | |z 9781614996262 |q (print) | ||
035 | |a (OCoLC)949930457 |z (OCoLC)950055579 |z (OCoLC)951221884 |z (OCoLC)1055359815 |z (OCoLC)1066457354 |z (OCoLC)1081206824 |z (OCoLC)1228549175 |z (OCoLC)1259180161 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems |d (2015 : |c Marktoberdorf, Germany) | |
245 | 1 | 0 | |a Dependable software systems engineering / |c edited by Javier Esparza, Orna Grumberg and Salomon Sickert. |
264 | 1 | |a Amsterdam, Netherlands : |b IOS Press, |c 2016. | |
264 | 4 | |c ©2016 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security. Series D, Information and communication security ; |v vol. 45 | |
500 | |a "Proceedings of the NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany, 4-16 August 2015." | ||
500 | |a Includes indexes. | ||
588 | 0 | |a Online resource; title from PDF title page (IOS Press, viewed May 26, 2016). | |
505 | 0 | |a Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs. | |
505 | 8 | |a Analysis and Synthesis with ""Big Code""Subject Index; Author Index. | |
504 | |a Includes bibliographical references at the end of each chapters and indexes. | ||
520 | |a In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 - 'Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents - combinatorics; and analysis of synthesis with 'Big Code'. The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security. | ||
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Computer networks |x Security measures |v Congresses. | |
650 | 0 | |a Software engineering |v Congresses. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Congrès. | |
650 | 6 | |a Génie logiciel |v Congrès. | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Esparza, Javier, |e editor. |0 http://id.loc.gov/authorities/names/n94097532 | |
700 | 1 | |a Grumberg, Orna, |e editor. |0 http://id.loc.gov/authorities/names/nb97057888 | |
700 | 1 | |a Sickert, Salomon, |e editor. | |
758 | |i has work: |a Dependable software systems engineering (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGt8QQrHvt8vjPKM6Q4Rq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Esparza, J. |t Dependable Software Systems Engineering. |d Fairfax : IOS Press, ©2016 |z 9781614996262 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v vol. 45. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1238935 |3 Volltext |
938 | |a Baker and Taylor |b BTCP |n BK0018922972 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4528955 | ||
938 | |a EBSCOhost |b EBSC |n 1238935 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis34603142 | ||
938 | |a YBP Library Services |b YANK |n 12996592 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn949930457 |
---|---|
_version_ | 1816882349566066688 |
adam_text | |
any_adam_object | |
author2 | Esparza, Javier Grumberg, Orna Sickert, Salomon |
author2_role | edt edt edt |
author2_variant | j e je o g og s s ss |
author_GND | http://id.loc.gov/authorities/names/n94097532 http://id.loc.gov/authorities/names/nb97057888 |
author_corporate | NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany) |
author_corporate_role | |
author_facet | Esparza, Javier Grumberg, Orna Sickert, Salomon NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany) |
author_sort | NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany) |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs. Analysis and Synthesis with ""Big Code""Subject Index; Author Index. |
ctrlnum | (OCoLC)949930457 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06185cam a2200721 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn949930457</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">160519s2016 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">IOSPR</subfield><subfield code="d">OCLCO</subfield><subfield code="d">EBLCP</subfield><subfield code="d">BTCTA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">CCO</subfield><subfield code="d">COCUF</subfield><subfield code="d">LOA</subfield><subfield code="d">K6U</subfield><subfield code="d">STF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">EZ9</subfield><subfield code="d">ICG</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">950055579</subfield><subfield code="a">951221884</subfield><subfield code="a">1055359815</subfield><subfield code="a">1066457354</subfield><subfield code="a">1081206824</subfield><subfield code="a">1228549175</subfield><subfield code="a">1259180161</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614996279</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">161499627X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1614996261</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614996262</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614996262</subfield><subfield code="q">(print)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)949930457</subfield><subfield code="z">(OCoLC)950055579</subfield><subfield code="z">(OCoLC)951221884</subfield><subfield code="z">(OCoLC)1055359815</subfield><subfield code="z">(OCoLC)1066457354</subfield><subfield code="z">(OCoLC)1081206824</subfield><subfield code="z">(OCoLC)1228549175</subfield><subfield code="z">(OCoLC)1259180161</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems</subfield><subfield code="d">(2015 :</subfield><subfield code="c">Marktoberdorf, Germany)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dependable software systems engineering /</subfield><subfield code="c">edited by Javier Esparza, Orna Grumberg and Salomon Sickert.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam, Netherlands :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2016.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security. Series D, Information and communication security ;</subfield><subfield code="v">vol. 45</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany, 4-16 August 2015."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (IOS Press, viewed May 26, 2016).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Analysis and Synthesis with ""Big Code""Subject Index; Author Index.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters and indexes.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 - 'Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents - combinatorics; and analysis of synthesis with 'Big Code'. The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Génie logiciel</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Esparza, Javier,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94097532</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grumberg, Orna,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb97057888</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sickert, Salomon,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Dependable software systems engineering (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGGt8QQrHvt8vjPKM6Q4Rq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Esparza, J.</subfield><subfield code="t">Dependable Software Systems Engineering.</subfield><subfield code="d">Fairfax : IOS Press, ©2016</subfield><subfield code="z">9781614996262</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">vol. 45.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1238935</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0018922972</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL4528955</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1238935</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis34603142</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12996592</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn949930457 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:27:12Z |
institution | BVB |
isbn | 9781614996279 161499627X 1614996261 9781614996262 |
language | English |
oclc_num | 949930457 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO science for peace and security. Series D, Information and communication security ; |
spelling | NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems (2015 : Marktoberdorf, Germany) Dependable software systems engineering / edited by Javier Esparza, Orna Grumberg and Salomon Sickert. Amsterdam, Netherlands : IOS Press, 2016. ©2016 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security. Series D, Information and communication security ; vol. 45 "Proceedings of the NATO Advanced Study Institute (ASI) on Verification and Synthesis of Correct and Secure Systems Marktoberdorf, Germany, 4-16 August 2015." Includes indexes. Online resource; title from PDF title page (IOS Press, viewed May 26, 2016). Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs. Analysis and Synthesis with ""Big Code""Subject Index; Author Index. Includes bibliographical references at the end of each chapters and indexes. In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 - 'Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents - combinatorics; and analysis of synthesis with 'Big Code'. The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security. Computer security Congresses. Computer networks Security measures Congresses. Software engineering Congresses. Sécurité informatique Congrès. Réseaux d'ordinateurs Sécurité Mesures Congrès. Génie logiciel Congrès. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Software engineering fast Conference papers and proceedings fast Esparza, Javier, editor. http://id.loc.gov/authorities/names/n94097532 Grumberg, Orna, editor. http://id.loc.gov/authorities/names/nb97057888 Sickert, Salomon, editor. has work: Dependable software systems engineering (Text) https://id.oclc.org/worldcat/entity/E39PCGGt8QQrHvt8vjPKM6Q4Rq https://id.oclc.org/worldcat/ontology/hasWork Print version: Esparza, J. Dependable Software Systems Engineering. Fairfax : IOS Press, ©2016 9781614996262 NATO science for peace and security series. Sub-series D, Information and communication security ; vol. 45. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1238935 Volltext |
spellingShingle | Dependable software systems engineering / NATO science for peace and security series. Information and communication security ; Title Page; Preface; Contents; Probabilistic Model Checking; SMT Solvers: Foundations and Applications; Formal Models for Analyzing Security Protocols: Some Lecture Notes; Parameterized Verification of Crowds of Anonymous Processes; Synthesis of Reactive Systems; Between Testing and Verification: Dynamic Software Model Checking; Learning-Based Compositional Model Checking of Behavioral UML Systems; Programming by Examples (and Its Applications in Data Wrangling); Verification of Concurrent Software; A Tutorial on Mean-Payoff and Energy Games; Equivalence -- Combinatorics, Algebra, Proofs. Analysis and Synthesis with ""Big Code""Subject Index; Author Index. Computer security Congresses. Computer networks Security measures Congresses. Software engineering Congresses. Sécurité informatique Congrès. Réseaux d'ordinateurs Sécurité Mesures Congrès. Génie logiciel Congrès. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Software engineering fast |
title | Dependable software systems engineering / |
title_auth | Dependable software systems engineering / |
title_exact_search | Dependable software systems engineering / |
title_full | Dependable software systems engineering / edited by Javier Esparza, Orna Grumberg and Salomon Sickert. |
title_fullStr | Dependable software systems engineering / edited by Javier Esparza, Orna Grumberg and Salomon Sickert. |
title_full_unstemmed | Dependable software systems engineering / edited by Javier Esparza, Orna Grumberg and Salomon Sickert. |
title_short | Dependable software systems engineering / |
title_sort | dependable software systems engineering |
topic | Computer security Congresses. Computer networks Security measures Congresses. Software engineering Congresses. Sécurité informatique Congrès. Réseaux d'ordinateurs Sécurité Mesures Congrès. Génie logiciel Congrès. COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Software engineering fast |
topic_facet | Computer security Congresses. Computer networks Security measures Congresses. Software engineering Congresses. Sécurité informatique Congrès. Réseaux d'ordinateurs Sécurité Mesures Congrès. Génie logiciel Congrès. COMPUTERS Security General. Computer networks Security measures Computer security Software engineering Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1238935 |
work_keys_str_mv | AT natoadvancedstudyinstituteasionverificationandsynthesisofcorrectandsecuresystemsmarktoberdorfgermany dependablesoftwaresystemsengineering AT esparzajavier dependablesoftwaresystemsengineering AT grumbergorna dependablesoftwaresystemsengineering AT sickertsalomon dependablesoftwaresystemsengineering |