LEADER 03469nam 2200685Ia 450 001 9910450859103321 005 20200520144314.0 010 $a6610934835 010 $a1-280-93483-2 010 $a9786610934836 010 $a1-4294-9223-6 010 $a1-60750-236-4 010 $a600-00-0561-X 010 $a1-4337-0874-4 035 $a(CKB)1000000000340119 035 $a(EBL)305176 035 $a(OCoLC)290589228 035 $a(SSID)ssj0000248176 035 $a(PQKBManifestationID)11209045 035 $a(PQKBTitleCode)TC0000248176 035 $a(PQKBWorkID)10200008 035 $a(PQKB)11359917 035 $a(MiAaPQ)EBC305176 035 $a(Au-PeEL)EBL305176 035 $a(CaPaEBR)ebr10186853 035 $a(CaONFJC)MIL93483 035 $a(EXLCZ)991000000000340119 100 $a20070511d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSoftware system reliability and security$b[electronic resource] /$fedited by Manfred Broy, Johannes Gru?nbauer and Tony Hoare 210 $aAmsterdam ;$aWashington, DC $cIOS Press$dc2007 215 $a1 online resource (428 p.) 225 1 $aNATO security through science series. Sub-series D, Information and communication security,$x1574-5589 ;$vv. 9 300 $a"The contributions in this volume have emerged from lectures of the 27th International Summer School on Software System Reliability and Security, held at Marktoberdorf from August 1 to August 13, 2006."--Pref., p. vi. 311 $a1-58603-731-5 320 $aIncludes bibliographical references. 327 $aTitle page; Preface; Contents; Logics and Automata for Software Model-Checking; Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures; Using Invariants to Reason About Cryptographic Protocols; Verified Interoperable Implementations of Security Protocols; Compensable Transactions; Automata on Infinite Words and Their Applications in Formal Verification; Practical Principles for Computer Security; Engineering Requirements for System Reliability and Security; Pervasive Verification of Distributed Real-Time Systems 327 $aVerification and Synthesis of Reactive ProgramsSecurity, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles; A Verifying Compiler for a Multi-Threaded Object-Oriented Language; Author Index 330 $aTo make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering. 410 0$aNATO security through science series.$nD,$pInformation and communication security ;$vv. 9. 606 $aComputer software$xReliability$vCongresses 606 $aComputer security$vCongresses 608 $aElectronic books. 615 0$aComputer software$xReliability 615 0$aComputer security 676 $a005.8 701 $aBroy$b M.$f1949-$0956797 701 $aGru?nbauer$b Johannes$01034028 701 $aHoare$b C. A. R$g(Charles Antony Richard),$f1934-$01034029 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910450859103321 996 $aSoftware system reliability and security$92452906 997 $aUNINA