<p>Complexity in automation- and safety systems in railway as well as automotive applications are dominated more and more by formal description means, methods and tools. Formal techniques provide next to correctness and integrity checkups โ especially for safety relevant systems โ the possibility to
Formal Logical Methods for System Security and Correctness
โ Scribed by Orna Grumberg, Orna Grumberg, Tobias Nipkow, Christian Pfaller
- Publisher
- IOS Press
- Year
- 2008
- Tongue
- English
- Leaves
- 332
- Series
- Nato Science for Peace and Security
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The objective of this publication is to present the state-of-the-art in the field of proof technology in connection with secure and correct software. The contributors have shown that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees. By providing the necessary theoretical background and presenting corresponding application oriented concepts, the objective is an in-depth presentation of such methods covering both theoretical foundations and industrial practice.
IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.
Some of the areas we publish in:
-Biomedicine -Oncology -Artificial intelligence -Databases and information systems -Maritime engineering -Nanotechnology -Geoengineering -All aspects of physics -E-governance -E-commerce -The knowledge economy -Urban studies -Arms control -Understanding and responding to terrorism -Medical informatics -Computer Sciences
โฆ Table of Contents
Title page......Page 1
Preface......Page 5
Contents......Page 9
Compilation of Certificates......Page 11
Formal Foundations of Computer Security......Page 39
Building a Software Model Checker......Page 63
Symbolic Trajectory Evaluation (STE): Automatic Refinement and Vacuity Detection......Page 99
Automated and Interactive Theorem Proving......Page 121
Correctness of Effect-Based Program Transformations......Page 159
Abstract and Concrete Models for Recursion......Page 185
Secrecy Analysis in Protocol Composition Logic......Page 209
The Engineering Challenges of Trustworthy Computing......Page 243
Reflecting Quantifier Elimination for Linear Arithmetic......Page 255
Content in Proofs of List Reversal......Page 277
Proof Theory, Large Functions and Combinatorics......Page 297
Author Index......Page 329
๐ SIMILAR VOLUMES
Complexity in automation- and safety systems in railway as well as automotive applications are dominated more and more by formal description means, methods and tools. Formal techniques provide next to correctness and integrity checkups - especially for safety relevant systems - the possibility to mo
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.The author investigates proofs of co
<p>This volume is the outcome of deliberations on formal methods in aerospace. The book specially delves into the use of formal methods for verification, validation, and optimization of software in safety critical and time critical applications, such as those in aerospace engineering. The chapters i
<p><p>The two volumes in this advanced textbook present results, proof methods, and translations of motivational and philosophical considerations to formal constructions. In this Vol. I the author explains preferential structures and abstract size. In the associated Vol. II he presents chapters on t