LEADER 03769nam 2200685 a 450 001 9910462437503321 005 20200520144314.0 010 $a6613717215 010 $a1-280-87590-9 010 $a9786613717214 010 $a1-61499-028-X 035 $a(CKB)2670000000210659 035 $a(EBL)948331 035 $a(OCoLC)797917368 035 $a(SSID)ssj0000739299 035 $a(PQKBManifestationID)12367125 035 $a(PQKBTitleCode)TC0000739299 035 $a(PQKBWorkID)10686905 035 $a(PQKB)11718684 035 $a(MiAaPQ)EBC948331 035 $a(Au-PeEL)EBL948331 035 $a(CaPaEBR)ebr10574718 035 $a(CaONFJC)MIL371721 035 $a(EXLCZ)992670000000210659 100 $a20120417d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSoftware safety and security$b[electronic resource] $etools for analysis and verification /$fedited by Tobias Nipkow, Orna Grumberg and Benedikt Hauptmann 210 $aWashington, D.C. $cIOS Press$d2012 215 $a1 online resource (400 p.) 225 1 $aNATO science for peace and security series. Sub-series D, Information and communication security,$x1874-6268 ;$vv. 33 300 $a"Published in cooperation with NATO Emerging Security Challenges Division." 300 $a"Proceedings of the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security, Bayrischzell, Germany, 2-14 August 2011"--T.p. verso. 300 $aIncludes indexes. 311 $a1-61499-027-1 327 $aSOFTWARE SAFETY AND SECURITY; Preface; Contents; Mechanizing Game-Based Proofs of Security Protocols; Formal Security Proofs; Model Checking: From BDDs to Interpolation; Interactive Proof: Applications to Semantics; Advances in Probabilistic Model Checking; Getting Started with Dafny: A Guide; Lecture Notes on Software Model Checking; Boolean Satisfiability Solvers: Techniques and Extensions; Interactive Proof: Introduction to Isabelle/HOL; A Primer on Separation Logic (and Automatic Program Verification and Analysis); A Perspective on Information-Flow Control 327 $aPrecise Program Analysis through Strategy Iteration and OptimizationSubject Index; Author Index 330 $aRecent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was 410 0$aNATO science for peace and security series.$nSub-series D,$pInformation and communication security ;$vv. 33. 606 $aComputer software$xVerification$vCongresses 606 $aComputer security$vCongresses 608 $aElectronic books. 615 0$aComputer software$xVerification 615 0$aComputer security 676 $a005 701 $aNipkow$b Tobias$f1958-$062010 701 $aGrumberg$b Orna$067499 701 $aHauptmann$b Benedikt$01027227 712 02$aNATO Emerging Security Challenges Division. 712 12$aNATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462437503321 996 $aSoftware safety and security$92442554 997 $aUNINA