Dependable Software Systems Engineering

Share
Editors
Esparza, J., Grumberg, O., Sickert, S.
Pub. date
April 2016
Pages
296
Binding
hardcover
Volume
45 of NATO Science for Peace and Security Series - D: Information and Communication Security
ISBN print
978-1-61499-626-2
ISBN online
978-1-61499-627-9
Subject
Computer Science, Computer Security
 
This book contains a subject index
€135 / US$155 / £115 Excl. VAT
Order Dependable Software Systems Engineering ISBN @ €135.00
Order Ebook

In the last few years we have all become daily users of Internet banking, social networks and cloud services. Preventing malfunctions in these services and protecting the integrity of private data from cyber attack are both current preoccupations of society at large. While modern technologies have dramatically improved the quality of software, the computer science community continues to address the problems of security by developing a theory of formal verification; a body of methodologies, algorithms and software tools for finding and eliminating bugs and security hazards.

This book presents lectures delivered at the NATO Advanced Study Institute (ASI) School Marktoberdorf 2015 – ‘Verification and Synthesis of Correct and Secure Systems'. During this two-week summer school, held in Marktoberdorf, Germany, in August 2015, the lecturers provided a comprehensive view of the current state-of-the-art in a large variety of subjects, including: models and techniques for analyzing security protocols; parameterized verification; synthesis of reactive systems; software model checking; composition checking; programming by examples; verification of current software; two-player zero-sum games played on graphs; software security by information flow; equivalents – combinatorics; and analysis of synthesis with 'Big Code'.

The Marktoberdorf ASIs have become a high-level scientific nucleus of the international scientific network on formal methods, and one of the major international computer science summer schools. This book will be of interest to all those seeking an overview of current theories and applications in formal verification and security.