Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
6
result(s) for
"Computer software-Verification-Congresses"
Sort by:
Verification of Infinite-State Systems with Applications to Security
by
Clarke, E
,
Minea, M
,
Ţiplea, F. L
in
Computer security-Congresses
,
Computer software-Verification-Congresses
,
System theory-Mathematical models-Congresses
2006
The recent years have brought a number of advances in the development of infinite state verification, using techniques such as symbolic or parameterized representations, symmetry reductions, abstractions, constraint-based approaches, combinations of model checking and theorem proving. The active state of research on this topic provides a good time-point to increase impact by bringing together leading scientists and practitioners from these individual approaches. This volume gives an overview of the current research directions and provides information for researchers interested in the development of mathematical techniques for the analysis of infinite state systems.
Dependable Software Systems Engineering
2015
We are all increasingly dependent on software systems to run the technology we use every day, so we need these systems to be both reliable and safe.This book presents papers from the NATO Advanced Study Institute Summer School Dependable Software Systems Engineering, held in Marktoberdorf, Germany, in July and August 2014. Lecturers were drawn from prestigious research groups representing both industry and academia, and the course was designed as an in-depth presentation and teaching of state-of-the-art scientific techniques and methods covering research and industrial practice as well as scientific principles.Topics covered
Software safety and security : tools for analysis and verification
by
Nipkow, Tobias
,
Grumberg, Orna
,
Hauptmann, Benedikt
in
Computer security-Congresses
,
Computer software-Verification-Congresses
2012
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs.Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems.
Software and Systems Safety
2011
Information security depends upon an understanding of the functionality of software systems. Customers and information can only be protected from attack if this functionality is guaranteed to be correct and safe. A scientific foundation of software engineering not only provides models enabling the capture of application domains and requirements, but also ensures an understanding of the structure and working of software systems, architectures and programs.This book presents contributions based on the lectures delivered at the 31st International Summer School: Software and Systems Safety: Specification and Verification held at Marktoberdorf, Germany, in August 2010, and provides an excellent overview of current research results with special emphasis on software information security. Leading international researchers and experts present their experience in the specification and verification of software systems, accompanied by corresponding tools and methods. Subjects addressed include: model-based testing, schemes and patterns of assumption/promise-based system specification, requirements models for critical systems, engineering evolving and self-adaptive systems, unifying models of data flow, model-based verification and analysis of real-time systems, and model checking. The book will be of interest to all those dealing with information systems for whom security is of paramount importance.
On the Grammar of Optative Constructions
2012
This monograph is one of the first theoretical studies of optatives. Optative constructions express desire without an overt lexical item that means 'desire'. The author specifically investigates optatives with the syntax of embedded clauses that contain prototypical particles such as 'only'. He rejects the view that optativity arises compositionally from the standard semantics of embedded clauses and prototypical particles. The following system is proposed: Desirability is due to a generalized scalar exclamation operator EX. Furthermore, clausal properties such as factivity/counterfactuality are encoded in a Mood head, which co-determines morphological mood and complementizer choice. Finally, the prototypical particles that optatives contain are truth-conditionally vacuous presupposition triggers. As a result, these meaning components do not interact directly, but their meanings converge, with the consequence that they prototypically co-occur. This monograph is of interest for formal semanticists, syntacticians, pragmaticists and morphologists, and especially relevant for research on mood and particle semantics.