LEADER 03833nam 2200745Ia 450 001 9910784143903321 005 20220323212423.0 010 $a6610505101 010 $a1-280-50510-9 010 $a9786610505104 010 $a1-4237-9742-6 010 $a1-60750-147-3 010 $a600-00-0603-9 010 $a1-60129-127-2 035 $a(CKB)1000000000340203 035 $a(EBL)265966 035 $a(OCoLC)191037906 035 $a(SSID)ssj0000267096 035 $a(PQKBManifestationID)11226127 035 $a(PQKBTitleCode)TC0000267096 035 $a(PQKBWorkID)10332835 035 $a(PQKB)11071143 035 $a(MiAaPQ)EBC265966 035 $a(Au-PeEL)EBL265966 035 $a(CaPaEBR)ebr10130654 035 $a(CaONFJC)MIL50510 035 $a(OCoLC)71251545 035 $a(EXLCZ)991000000000340203 100 $a20060407d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aVerification of infinite-state systems with applications to security$b[electronic resource] /$fedited by Edmund Clarke, Marius Minea and Ferucio Laurent?iu T?iplea 210 $aAmsterdam ;$aWashington, D.C. $cIOS Press$dc2006 215 $a1 online resource (244 p.) 225 1 $aNATO security through science series. D, Information and communication security ;$vvol. 1 300 $aProceedings of the NATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security, Timas?oara, Romania, March 17-22, 2005. 311 $a1-58603-570-3 320 $aIncludes bibliographical references and author index. 327 $aTitle page; Preface; Committees; Contents; Number-Set Representations for Infinite-State Verification; Regular Model Checking for Programs with Dynamic Memory; Automatic Verification of Security Properties Based on Abstractions; Grand Challenge: Model Check Software; A Class of Automata for Computing Reachability Relations in Timed Systems; Practical Infinite-State Verification with Temporal Reasoning; Quantum States and Quantum Measurements; Automatic Test Generation and Monitoring of Infinite States Systems; Cryptographic Primitives Can Be Fragile 327 $aFrom Temporal Logic Queries to Vacuity DetectionProbability and Time in Measuring Security; Decidability and Complexity Results for Security Protocols; Dealing with Communication for Dynamic Multithreaded Recursive Programs; Scenario Graphs Applied to Security (Extended Abstract); Author Index 330 $aProvides information for researchers interested in the development of mathematical techniques for the analysis of infinite state systems. The papers come from a successful workshop. 410 0$aNATO security through science series.$nD,$pInformation and communication security ;$vv. 1. 606 $aSystem theory$xMathematical models$vCongresses 606 $aSystem theory$xSecurity measures$vCongresses 606 $aComputer security$vCongresses 606 $aComputer software$xVerification$vCongresses 615 0$aSystem theory$xMathematical models 615 0$aSystem theory$xSecurity measures 615 0$aComputer security 615 0$aComputer software$xVerification 676 $a005.8 701 $aClarke$b Edmund M.$cJr.$g(Edmund Melson),$f1945-2020.$067498 701 $aMinea$b Marius$01514192 701 $aT?iplea$b Ferucio Laurent?iu$01514193 712 12$aNATO Advanced Research Workshop on Verification of Infinite-state Systems with Applications to Security$f(2005 March 17-22 :$eTimas?oara, Romania) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784143903321 996 $aVerification of infinite-state systems with applications to security$93749154 997 $aUNINA