Description |
1 online resource (332 pages) |
Series |
NATO Science for Peace and Security Series: Information and Communication Security, v. 14 |
|
NATO Science for Peace and Security Series: Information and Communication Security, v. 14
|
Contents |
Title page; Preface; Contents; Compilation of Certificates; Formal Foundations of Computer Security; Building a Software Model Checker; Symbolic Trajectory Evaluation (STE): Automatic Refinement and Vacuity Detection; Automated and Interactive Theorem Proving; Correctness of Effect-Based Program Transformations; Abstract and Concrete Models for Recursion; Secrecy Analysis in Protocol Composition Logic; The Engineering Challenges of Trustworthy Computing; Reflecting Quantifier Elimination for Linear Arithmetic; Content in Proofs of List Reversal; Proof Theory, Large Functions and Combinatorics |
|
Author Index |
Summary |
Offers information in the field of proof technology in connection with secure and correct software. This title shows that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees |
Notes |
Print version record |
Subject |
Computer logic -- Congresses
|
|
Computer security -- Congresses
|
|
Computer logic
|
|
Computer security
|
Genre/Form |
Conference papers and proceedings
|
Form |
Electronic book
|
Author |
Nipkow, T
|
|
Pfaller, C
|
ISBN |
9781433712333 |
|
1433712334 |
|
9781607503156 |
|
1607503158 |
|