LEADER 03283nam 2200697 a 450 001 9910785024303321 005 20200520144314.0 010 $a6612692677 010 $a1-282-69267-4 010 $a9786612692673 010 $a1-60750-100-7 035 $a(CKB)2670000000033288 035 $a(EBL)557042 035 $a(SSID)ssj0000439121 035 $a(PQKBManifestationID)12120114 035 $a(PQKBTitleCode)TC0000439121 035 $a(PQKBWorkID)10463946 035 $a(PQKB)10842109 035 $a(Au-PeEL)EBL557042 035 $a(CaPaEBR)ebr10403989 035 $a(CaONFJC)MIL269267 035 $a(OCoLC)647184853 035 $a(MiAaPQ)EBC557042 035 $a(EXLCZ)992670000000033288 100 $a20100111d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aLogics and languages for reliability and security$b[electronic resource] /$f[edited by] Javier Esparza, Bernd Spanfelner, Orna Grumberg 210 $aWashington, D.C. $cIOS Press$d2010 215 $a1 online resource (336 p.) 225 1 $aNATO science for peace and security series. D, Information and communication security ;$vv. 25 300 $aIncludes indexes. 311 $a1-60750-099-X 327 $aTitle page; Preface; Contents; A Gentle Introduction to Formal Verification of Computer Systems by Abstract Interpretation; Newtonian Program Analysis -- An Introduction; Principles and Applications of Refinement Types; 2-Valued and 3-Valued Abstraction-Refinement in Model Checking; Modal Fixed Point Logics; Effective Analysis of Infinite State Stochastic Processes and Games; Multi-Valued Automata and Their Applications; Mechanized Semantics; Using Security Policies to Write Secure Software; Models of Higher-Order Computation: Recursion Schemes and Collapsible Pushdown Automata 327 $aImplicit Flows in Malicious and Nonmalicious CodeSubject Index; Author Index 330 $aSoftware-intensive systems are an integral part of many products. They provide great benefits regarding ease of use and allow for various applications, and also impose enormous responsibilities. This title presents the papers which formed the basis for lectures at the 2009 summer school Formal Logical Methods for System Security and Correctness. 410 0$aNATO science for peace and security series.$nSub-series D,$pInformation and communication security ;$vv. 25. 606 $aProgramming languages (Electronic computers) 606 $aLanguages, Artificial 606 $aComputers$xReliability 606 $aComputer security 615 0$aProgramming languages (Electronic computers) 615 0$aLanguages, Artificial. 615 0$aComputers$xReliability. 615 0$aComputer security. 676 $a005.8 701 $aEsparza$b Javier$01580924 701 $aSpanfelner$b Bernd$01580925 701 $aGrumberg$b Orna$067499 712 02$aTechnische Universita?t Mu?nchen (Germany) 712 02$aTECHNION.$bIsrael Institute of Technology (Israel) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910785024303321 996 $aLogics and languages for reliability and security$93862161 997 $aUNINA