Software and systems safety :: specification and verification /
Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the c...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | , , |
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
2011.
|
Schriftenreihe: | NATO science for peace and security series. Information and communication security ;
v. 30. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance. |
Beschreibung: | "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. |
Beschreibung: | 1 online resource (296 pages) |
Bibliographie: | Includes bibliographical references at chapter ends, and indexes. |
ISBN: | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 6613289604 9786613289605 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn756484723 | ||
003 | OCoLC | ||
005 | 20240405112445.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 111010s2011 ne ob 101 0 eng d | ||
010 | |z 2011922667 | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d IOSPR |d N$T |d YDXCP |d OCLCQ |d E7B |d OCLCQ |d IDEBK |d OCLCQ |d OCLCO |d DEBSZ |d OCLCQ |d OCLCO |d OCLCF |d CDX |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d OCLCO |d AGLDB |d OCLCQ |d MOR |d PIFAG |d ZCU |d OCLCQ |d MERUC |d OCLCQ |d U3W |d TXI |d OCLCA |d JBG |d STF |d VNS |d WRM |d OCLCQ |d VTS |d NRAMU |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d OCLCQ |d A6Q |d DKC |d OCLCQ |d M8D |d OCLCQ |d UKCRE |d AJS |d OCLCO |d OCLCQ |d QGK |d OCLCO |d OCLCL | ||
016 | 7 | |a 015792611 |2 Uk | |
019 | |a 795756264 |a 816866086 |a 961550007 |a 988433728 |a 991916958 |a 1037787581 |a 1038568538 |a 1045541735 |a 1055356104 |a 1066593961 |a 1077263458 |a 1081242648 |a 1083600150 |a 1153496574 |a 1228616380 |a 1259220079 | ||
020 | |a 9781607507116 |q (electronic bk.) | ||
020 | |a 1607507110 |q (electronic bk.) | ||
020 | |a 9781607507109 | ||
020 | |a 1607507102 | ||
020 | |a 1283289601 | ||
020 | |a 9781283289603 | ||
020 | |a 6613289604 | ||
020 | |a 9786613289605 | ||
024 | 8 | |a 9786613289605 | |
035 | |a (OCoLC)756484723 |z (OCoLC)795756264 |z (OCoLC)816866086 |z (OCoLC)961550007 |z (OCoLC)988433728 |z (OCoLC)991916958 |z (OCoLC)1037787581 |z (OCoLC)1038568538 |z (OCoLC)1045541735 |z (OCoLC)1055356104 |z (OCoLC)1066593961 |z (OCoLC)1077263458 |z (OCoLC)1081242648 |z (OCoLC)1083600150 |z (OCoLC)1153496574 |z (OCoLC)1228616380 |z (OCoLC)1259220079 | ||
037 | |a 328960 |b MIL | ||
050 | 4 | |a QA76.76.V47 |b N38 2011eb | |
050 | 4 | |a HD38.5 | |
072 | 7 | |a COM |x COM053000 |2 bisacsh | |
072 | 7 | |a COM |x 051390 |2 bisacsh | |
072 | 7 | |a COM |x 051230 |2 bisacsh | |
072 | 7 | |a COM |x 051440 |2 bisacsh | |
082 | 7 | |a 005.10289 | |
049 | |a MAIN | ||
111 | 2 | |a NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification |d (2010 : |c Marktoberdorf, Germany) | |
245 | 1 | 0 | |a Software and systems safety : |b specification and verification / |c edited by Manfred Broy, Christian Leuxner and Tony Hoare. |
260 | |a Amsterdam : |b IOS Press, |c 2011. | ||
300 | |a 1 online resource (296 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO Science for Peace and Security Series D: Information and Communication Security ; |v v. 30 | |
500 | |a "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. | ||
504 | |a Includes bibliographical references at chapter ends, and indexes. | ||
505 | 0 | 0 | |t Model-based testing / |r Mark Timmer, Ed Brinksma and Mariëlle Stoelinga -- |t Towards a theory of architectural contracts : |t schemes and patterns of assumption/promise based system specification / |r Manfred Broy -- |t Engineering evolving and self-adaptive systems: an overview / |r Carlo Ghezzi -- |t Formal verification / |r John Harrison -- |t Requirements models for critical systems / |r Constance Heitmeyer -- |t From concurrency models to numbers : |t performance and dependability / |r Holger Hermanns and Lijun Zhang -- |t Unifying models of data flow / |r Tony Hoare and John Wickerson -- |t Model-based verification and analysis for real-time systems / |r Uli Fahrenberg, Kim G. Larsen and Claus Thrane -- |t Model checking / |r Doron Peled. |
520 | |a Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance. | ||
588 | |a Print version record. | ||
546 | |a English. | ||
650 | 0 | |a Computer software |x Verification |v Congresses. | |
650 | 0 | |a Software engineering |v Congresses. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 6 | |a Logiciels |x Vérification |v Congrès. | |
650 | 6 | |a Génie logiciel |v Congrès. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 7 | |a COMPUTERS |x Programming |x Open Source. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Software Development & Engineering |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Software Development & Engineering |x Tools. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software |x Verification |2 fast | |
650 | 7 | |a Software engineering |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Broy, M., |d 1949- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3 |0 http://id.loc.gov/authorities/names/n79060851 | |
700 | 1 | |a Leuxner, Christian, |e editor. |0 http://id.loc.gov/authorities/names/no2012159629 | |
700 | 1 | |a Hoare, C. A. R. |q (Charles Antony Richard), |d 1934- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP |0 http://id.loc.gov/authorities/names/n84148204 | |
758 | |i has work: |a Software and systems safety (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFyJpbfp9Fm6q43jRRrMGd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Broy, M. |t Software and Systems Safety : Specification and Verification. |d Amsterdam : IOS Press, ©2011 |z 9781607507109 |
830 | 0 | |a NATO science for peace and security series. |n Sub-series D, |p Information and communication security ; |v v. 30. |0 http://id.loc.gov/authorities/names/no2007140990 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395230 |3 Volltext |
938 | |a Coutts Information Services |b COUT |n 19558376 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL784589 | ||
938 | |a ebrary |b EBRY |n ebr10506356 | ||
938 | |a EBSCOhost |b EBSC |n 395230 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 328960 | ||
938 | |a YBP Library Services |b YANK |n 3639900 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn756484723 |
---|---|
_version_ | 1804748432679632896 |
adam_text | |
any_adam_object | |
author2 | Broy, M., 1949- Leuxner, Christian Hoare, C. A. R. (Charles Antony Richard), 1934- |
author2_role | edt edt edt |
author2_variant | m b mb c l cl c a r h car carh |
author_GND | http://id.loc.gov/authorities/names/n79060851 http://id.loc.gov/authorities/names/no2012159629 http://id.loc.gov/authorities/names/n84148204 |
author_additional | Mark Timmer, Ed Brinksma and Mariëlle Stoelinga -- Manfred Broy -- Carlo Ghezzi -- John Harrison -- Constance Heitmeyer -- Holger Hermanns and Lijun Zhang -- Tony Hoare and John Wickerson -- Uli Fahrenberg, Kim G. Larsen and Claus Thrane -- Doron Peled. |
author_corporate | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification Marktoberdorf, Germany |
author_corporate_role | |
author_facet | Broy, M., 1949- Leuxner, Christian Hoare, C. A. R. (Charles Antony Richard), 1934- NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification Marktoberdorf, Germany |
author_sort | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification Marktoberdorf, Germany |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.V47 N38 2011eb HD38.5 |
callnumber-search | QA76.76.V47 N38 2011eb HD38.5 |
callnumber-sort | QA 276.76 V47 N38 42011EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBU |
contents | Model-based testing / Towards a theory of architectural contracts : schemes and patterns of assumption/promise based system specification / Engineering evolving and self-adaptive systems: an overview / Formal verification / Requirements models for critical systems / From concurrency models to numbers : performance and dependability / Unifying models of data flow / Model-based verification and analysis for real-time systems / Model checking / |
ctrlnum | (OCoLC)756484723 |
dewey-full | 005.10289 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.10289 |
dewey-search | 005.10289 |
dewey-sort | 15.10289 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06985cam a2200865Mi 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn756484723</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240405112445.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">111010s2011 ne ob 101 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011922667</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">IOSPR</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">CDX</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">TXI</subfield><subfield code="d">OCLCA</subfield><subfield code="d">JBG</subfield><subfield code="d">STF</subfield><subfield code="d">VNS</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">015792611</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">795756264</subfield><subfield code="a">816866086</subfield><subfield code="a">961550007</subfield><subfield code="a">988433728</subfield><subfield code="a">991916958</subfield><subfield code="a">1037787581</subfield><subfield code="a">1038568538</subfield><subfield code="a">1045541735</subfield><subfield code="a">1055356104</subfield><subfield code="a">1066593961</subfield><subfield code="a">1077263458</subfield><subfield code="a">1081242648</subfield><subfield code="a">1083600150</subfield><subfield code="a">1153496574</subfield><subfield code="a">1228616380</subfield><subfield code="a">1259220079</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507116</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507110</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607507109</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607507102</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283289601</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283289603</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6613289604</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786613289605</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">9786613289605</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)756484723</subfield><subfield code="z">(OCoLC)795756264</subfield><subfield code="z">(OCoLC)816866086</subfield><subfield code="z">(OCoLC)961550007</subfield><subfield code="z">(OCoLC)988433728</subfield><subfield code="z">(OCoLC)991916958</subfield><subfield code="z">(OCoLC)1037787581</subfield><subfield code="z">(OCoLC)1038568538</subfield><subfield code="z">(OCoLC)1045541735</subfield><subfield code="z">(OCoLC)1055356104</subfield><subfield code="z">(OCoLC)1066593961</subfield><subfield code="z">(OCoLC)1077263458</subfield><subfield code="z">(OCoLC)1081242648</subfield><subfield code="z">(OCoLC)1083600150</subfield><subfield code="z">(OCoLC)1153496574</subfield><subfield code="z">(OCoLC)1228616380</subfield><subfield code="z">(OCoLC)1259220079</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">328960</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.V47</subfield><subfield code="b">N38 2011eb</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD38.5</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051390</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051230</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">051440</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.10289</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification</subfield><subfield code="d">(2010 :</subfield><subfield code="c">Marktoberdorf, Germany)</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Software and systems safety :</subfield><subfield code="b">specification and verification /</subfield><subfield code="c">edited by Manfred Broy, Christian Leuxner and Tony Hoare.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (296 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO Science for Peace and Security Series D: Information and Communication Security ;</subfield><subfield code="v">v. 30</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at chapter ends, and indexes.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Model-based testing /</subfield><subfield code="r">Mark Timmer, Ed Brinksma and Mariëlle Stoelinga --</subfield><subfield code="t">Towards a theory of architectural contracts :</subfield><subfield code="t">schemes and patterns of assumption/promise based system specification /</subfield><subfield code="r">Manfred Broy --</subfield><subfield code="t">Engineering evolving and self-adaptive systems: an overview /</subfield><subfield code="r">Carlo Ghezzi --</subfield><subfield code="t">Formal verification /</subfield><subfield code="r">John Harrison --</subfield><subfield code="t">Requirements models for critical systems /</subfield><subfield code="r">Constance Heitmeyer --</subfield><subfield code="t">From concurrency models to numbers :</subfield><subfield code="t">performance and dependability /</subfield><subfield code="r">Holger Hermanns and Lijun Zhang --</subfield><subfield code="t">Unifying models of data flow /</subfield><subfield code="r">Tony Hoare and John Wickerson --</subfield><subfield code="t">Model-based verification and analysis for real-time systems /</subfield><subfield code="r">Uli Fahrenberg, Kim G. Larsen and Claus Thrane --</subfield><subfield code="t">Model checking /</subfield><subfield code="r">Doron Peled.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Vérification</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Génie logiciel</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Programming</subfield><subfield code="x">Open Source.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Software Development & Engineering</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Software Development & Engineering</subfield><subfield code="x">Tools.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Verification</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Software engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Broy, M.,</subfield><subfield code="d">1949-</subfield><subfield code="e">editor.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79060851</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Leuxner, Christian,</subfield><subfield code="e">editor.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012159629</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoare, C. A. R.</subfield><subfield code="q">(Charles Antony Richard),</subfield><subfield code="d">1934-</subfield><subfield code="e">editor.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n84148204</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Software and systems safety (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFyJpbfp9Fm6q43jRRrMGd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Broy, M.</subfield><subfield code="t">Software and Systems Safety : Specification and Verification.</subfield><subfield code="d">Amsterdam : IOS Press, ©2011</subfield><subfield code="z">9781607507109</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">Sub-series D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">v. 30.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007140990</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395230</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">19558376</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL784589</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10506356</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">395230</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">328960</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3639900</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBU-ocn756484723 |
illustrated | Not Illustrated |
indexdate | 2024-07-16T15:03:47Z |
institution | BVB |
isbn | 9781607507116 1607507110 9781607507109 1607507102 1283289601 9781283289603 6613289604 9786613289605 |
language | English |
oclc_num | 756484723 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (296 pages) |
psigel | ZDB-4-EBU |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Information and communication security ; |
series2 | NATO Science for Peace and Security Series D: Information and Communication Security ; |
spelling | NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification (2010 : Marktoberdorf, Germany) Software and systems safety : specification and verification / edited by Manfred Broy, Christian Leuxner and Tony Hoare. Amsterdam : IOS Press, 2011. 1 online resource (296 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO Science for Peace and Security Series D: Information and Communication Security ; v. 30 "Proceedings of the NATO Advanced Study Institute on Software and Systems Safety: Specification and Verification, Marktoberdorf, Germany, 3-15 August 2010"--Title page verso. Includes bibliographical references at chapter ends, and indexes. Model-based testing / Mark Timmer, Ed Brinksma and Mariëlle Stoelinga -- Towards a theory of architectural contracts : schemes and patterns of assumption/promise based system specification / Manfred Broy -- Engineering evolving and self-adaptive systems: an overview / Carlo Ghezzi -- Formal verification / John Harrison -- Requirements models for critical systems / Constance Heitmeyer -- From concurrency models to numbers : performance and dependability / Holger Hermanns and Lijun Zhang -- Unifying models of data flow / Tony Hoare and John Wickerson -- Model-based verification and analysis for real-time systems / Uli Fahrenberg, Kim G. Larsen and Claus Thrane -- Model checking / Doron Peled. Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs. This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance. Print version record. English. Computer software Verification Congresses. Software engineering Congresses. Computer security Congresses. Logiciels Vérification Congrès. Génie logiciel Congrès. Sécurité informatique Congrès. COMPUTERS Programming Open Source. bisacsh COMPUTERS Software Development & Engineering General. bisacsh COMPUTERS Software Development & Engineering Tools. bisacsh Computer security fast Computer software Verification fast Software engineering fast Conference papers and proceedings fast Broy, M., 1949- editor. https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3 http://id.loc.gov/authorities/names/n79060851 Leuxner, Christian, editor. http://id.loc.gov/authorities/names/no2012159629 Hoare, C. A. R. (Charles Antony Richard), 1934- editor. https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP http://id.loc.gov/authorities/names/n84148204 has work: Software and systems safety (Text) https://id.oclc.org/worldcat/entity/E39PCFyJpbfp9Fm6q43jRRrMGd https://id.oclc.org/worldcat/ontology/hasWork Print version: Broy, M. Software and Systems Safety : Specification and Verification. Amsterdam : IOS Press, ©2011 9781607507109 NATO science for peace and security series. Sub-series D, Information and communication security ; v. 30. http://id.loc.gov/authorities/names/no2007140990 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395230 Volltext |
spellingShingle | Software and systems safety : specification and verification / NATO science for peace and security series. Information and communication security ; Model-based testing / Towards a theory of architectural contracts : schemes and patterns of assumption/promise based system specification / Engineering evolving and self-adaptive systems: an overview / Formal verification / Requirements models for critical systems / From concurrency models to numbers : performance and dependability / Unifying models of data flow / Model-based verification and analysis for real-time systems / Model checking / Computer software Verification Congresses. Software engineering Congresses. Computer security Congresses. Logiciels Vérification Congrès. Génie logiciel Congrès. Sécurité informatique Congrès. COMPUTERS Programming Open Source. bisacsh COMPUTERS Software Development & Engineering General. bisacsh COMPUTERS Software Development & Engineering Tools. bisacsh Computer security fast Computer software Verification fast Software engineering fast |
title | Software and systems safety : specification and verification / |
title_alt | Model-based testing / Towards a theory of architectural contracts : schemes and patterns of assumption/promise based system specification / Engineering evolving and self-adaptive systems: an overview / Formal verification / Requirements models for critical systems / From concurrency models to numbers : performance and dependability / Unifying models of data flow / Model-based verification and analysis for real-time systems / Model checking / |
title_auth | Software and systems safety : specification and verification / |
title_exact_search | Software and systems safety : specification and verification / |
title_full | Software and systems safety : specification and verification / edited by Manfred Broy, Christian Leuxner and Tony Hoare. |
title_fullStr | Software and systems safety : specification and verification / edited by Manfred Broy, Christian Leuxner and Tony Hoare. |
title_full_unstemmed | Software and systems safety : specification and verification / edited by Manfred Broy, Christian Leuxner and Tony Hoare. |
title_short | Software and systems safety : |
title_sort | software and systems safety specification and verification |
title_sub | specification and verification / |
topic | Computer software Verification Congresses. Software engineering Congresses. Computer security Congresses. Logiciels Vérification Congrès. Génie logiciel Congrès. Sécurité informatique Congrès. COMPUTERS Programming Open Source. bisacsh COMPUTERS Software Development & Engineering General. bisacsh COMPUTERS Software Development & Engineering Tools. bisacsh Computer security fast Computer software Verification fast Software engineering fast |
topic_facet | Computer software Verification Congresses. Software engineering Congresses. Computer security Congresses. Logiciels Vérification Congrès. Génie logiciel Congrès. Sécurité informatique Congrès. COMPUTERS Programming Open Source. COMPUTERS Software Development & Engineering General. COMPUTERS Software Development & Engineering Tools. Computer security Computer software Verification Software engineering Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=395230 |
work_keys_str_mv | AT natoadvancedstudyinstituteonsoftwareandsystemssafetyspecificationandverificationmarktoberdorfgermany softwareandsystemssafetyspecificationandverification AT broym softwareandsystemssafetyspecificationandverification AT leuxnerchristian softwareandsystemssafetyspecificationandverification AT hoarecar softwareandsystemssafetyspecificationandverification |