LEADER 03429nam 2200685Ia 450 001 9910806173403321 005 20200520144314.0 010 $a6610934835 010 $a1-280-93483-2 010 $a9786610934836 010 $a1-4294-9223-6 010 $a1-60750-236-4 010 $a600-00-0561-X 010 $a1-4337-0874-4 035 $a(CKB)1000000000340119 035 $a(EBL)305176 035 $a(OCoLC)290589228 035 $a(SSID)ssj0000248176 035 $a(PQKBManifestationID)11209045 035 $a(PQKBTitleCode)TC0000248176 035 $a(PQKBWorkID)10200008 035 $a(PQKB)11359917 035 $a(MiAaPQ)EBC305176 035 $a(Au-PeEL)EBL305176 035 $a(CaPaEBR)ebr10186853 035 $a(CaONFJC)MIL93483 035 $a(EXLCZ)991000000000340119 100 $a20070511d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSoftware system reliability and security /$fedited by Manfred Broy, Johannes Grunbauer and Tony Hoare 205 $a1st ed. 210 $aAmsterdam ;$aWashington, DC $cIOS Press$dc2007 215 $a1 online resource (428 p.) 225 1 $aNATO security through science series. Sub-series D, Information and communication security,$x1574-5589 ;$vv. 9 300 $a"The contributions in this volume have emerged from lectures of the 27th International Summer School on Software System Reliability and Security, held at Marktoberdorf from August 1 to August 13, 2006."--Pref., p. vi. 311 $a1-58603-731-5 320 $aIncludes bibliographical references. 327 $aTitle page; Preface; Contents; Logics and Automata for Software Model-Checking; Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures; Using Invariants to Reason About Cryptographic Protocols; Verified Interoperable Implementations of Security Protocols; Compensable Transactions; Automata on Infinite Words and Their Applications in Formal Verification; Practical Principles for Computer Security; Engineering Requirements for System Reliability and Security; Pervasive Verification of Distributed Real-Time Systems 327 $aVerification and Synthesis of Reactive ProgramsSecurity, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles; A Verifying Compiler for a Multi-Threaded Object-Oriented Language; Author Index 330 $aTo make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering. 410 0$aNATO security through science series.$nD,$pInformation and communication security ;$vv. 9. 606 $aComputer software$xReliability$vCongresses 606 $aComputer security$vCongresses 615 0$aComputer software$xReliability 615 0$aComputer security 676 $a005.8 701 $aBroy$b M.$f1949-$01681196 701 $aGrunbauer$b Johannes$01681197 701 $aHoare$b C. A. R$g(Charles Antony Richard),$f1934-$01681198 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910806173403321 996 $aSoftware system reliability and security$94050465 997 $aUNINA