LEADER 04193oam 2200577I 450 001 9910798482303321 005 20240102112657.0 010 $a9781614996279 010 $a1-61499-627-X 035 $a(CKB)3710000000685539 035 $a(EBL)4528955 035 $a(MiAaPQ)EBC4528955 035 $a(Au-PeEL)EBL4528955 035 $a(CaPaEBR)ebr11212748 035 $a(CaONFJC)MIL923285 035 $a(OCoLC)951221884 035 $a(EXLCZ)993710000000685539 100 $a20160602h20162016 uy 0 101 0 $aeng 135 $aurcnu|||uuuuu 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDependable software systems engineering /$fedited by Javier Esparza, Orna Grumberg, Salomon Sickert 210 1$aAmsterdam, Netherlands :$cIOS Press,$d2016. 210 4$dİ2016 215 $a1 online resource (296 pages) 225 1 $aNATO Science for Peace and Security Series : Sub-Series D: Information and Communication Security,$x1879-8292 ;$vVolume 45 300 $aDescription based upon print version of record. 311 1 $a1-61499-626-1 320 $aIncludes bibliographical references at the end of each chapters and indexes. 327 $a1. Probabilistic Model Checking -- SMT Solvers: Foundations and Applications -- 2. Formal Models for Analyzing Security Protocols: Some Lecture Notes -- 3. Parameterized Verification of Crowds of Anonymous Processes -- 4. Synthesis of Reactive Systems -- 5. Between Testing and Verification: Dynamic Software Model Checking -- 6. Learning-Based Compositional Model Checking of Behavioral UML Systems -- 7. Programming by Examples (and Its Applications in Data Wrangling) -- 8. Verification of Concurrent Software -- 9. A Tutorial on Mean-Payoff and Energy Games -- 10. Equivalence - Combinatorics, Algebra, Proofs -- 11. Analysis and Synthesis with "Big Code" 330 $aIn the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards. This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 ? ?Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents ? combinatorics; and analysis of synthesis with 'Big Code'. The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security. 606 $aComputer security$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 606 $aSoftware engineering$vCongresses 615 0$aComputer security 615 0$aComputer networks$xSecurity measures 615 0$aSoftware engineering 676 $a005.8 702 $aEsparza$b Javier 702 $aGrumberg$b Orna 702 $aSickert$b Salomon 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 801 2$b6680 906 $aBOOK 912 $a9910798482303321 996 $aDependable software systems engineering$93693188 997 $aUNINA