Cargando…

Formal Logical Methods for System Security and Correctness.

Offers information in the field of proof technology in connection with secure and correct software. This title shows that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Grumberg, O.
Otros Autores: Nipkow, T., Pfaller, C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : IOS Press, 2008.
Colección:NATO Science for Peace and Security Series: Information and Communication Security, v. 14.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mu 4500
001 EBOOKCENTRAL_ocn437213124
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|---|||||
008 090817s2008 ne o 000 0 eng d
040 |a MERUC  |b eng  |e pn  |c MERUC  |d EBLCP  |d OCLCQ  |d YDXCP  |d DEBSZ  |d OCLCQ  |d ZCU  |d MERUC  |d U3W  |d OCLCO  |d OCLCA  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCA  |d ICG  |d INT  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 476162632 
020 |a 9781433712333  |q (electronic bk.) 
020 |a 1433712334  |q (electronic bk.) 
020 |a 9781607503156 
020 |a 1607503158 
029 1 |a DEBBG  |b BV044129764 
029 1 |a DEBSZ  |b 430489064 
035 |a (OCoLC)437213124  |z (OCoLC)476162632 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Grumberg, O. 
245 1 0 |a Formal Logical Methods for System Security and Correctness. 
260 |a Amsterdam :  |b IOS Press,  |c 2008. 
300 |a 1 online resource (332 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a NATO Science for Peace and Security Series: Information and Communication Security, v. 14 
505 0 |a Title page; Preface; Contents; Compilation of Certificates; Formal Foundations of Computer Security; Building a Software Model Checker; Symbolic Trajectory Evaluation (STE): Automatic Refinement and Vacuity Detection; Automated and Interactive Theorem Proving; Correctness of Effect-Based Program Transformations; Abstract and Concrete Models for Recursion; Secrecy Analysis in Protocol Composition Logic; The Engineering Challenges of Trustworthy Computing; Reflecting Quantifier Elimination for Linear Arithmetic; Content in Proofs of List Reversal; Proof Theory, Large Functions and Combinatorics. 
505 8 |a Author Index. 
520 |a Offers information in the field of proof technology in connection with secure and correct software. This title shows that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer logic  |v Congresses. 
650 0 |a Computer security  |v Congresses. 
650 6 |a Logique informatique  |v Congrès. 
650 6 |a Sécurité informatique  |v Congrès. 
650 7 |a Computer logic  |2 fast 
650 7 |a Computer security  |2 fast 
655 7 |a Conference papers and proceedings  |2 fast 
700 1 |a Nipkow, T. 
700 1 |a Pfaller, C. 
758 |i has work:  |a Formal Logical Methods for System Security and Correctness (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYRHy9D6VDvwPtYhmdBWJ8  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 1 |z 9781586038434 
830 0 |a NATO Science for Peace and Security Series: Information and Communication Security, v. 14. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=346214  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL346214 
938 |a YBP Library Services  |b YANK  |n 2823753 
994 |a 92  |b IZTAP