You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.
This book provides an overview of the theoretical underpinnings of modern probabilistic programming and presents applications in e.g., machine learning, security, and approximate computing. Comprehensive survey chapters make the material accessible to graduate students and non-experts. This title is also available as Open Access on Cambridge Core.
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop of the TYPES Working Group, TYPES 2002, held in Berg en Dal, The Netherlands in April 2002. The 18 revised full papers presented were carefully selected during two rounds of reviewing and improvement. All current issues in type theory and type systems and their applications to programming, systems design, and proof theory are addressed. Among the systems dealt with are Coq and Isar/HOL.
The 17 revised full papers presented here cover all current issues of formal reasoning and computer programming based on type theory are addressed; in particular languages and computerised tools for reasoning, and applications in several domains such as analysis of programming languages, certified software, formalisation of mathematics and mathematics education.
This book constitutes the refereed proceedings of the 17th European Symposium on Programming, ESOP 2008, held in Budapest, Hungary, in March/April 2008, as part of ETAPS 2008, the European Joint Conferences on Theory and Practice of Software. The 25 revised full papers presented together with the abstract of one invited talk and two tool presentations were carefully reviewed and selected from 104 submissions and address fundamental issues in the specification, analysis, and implementation of programming languages and sytems. The papers are organized in topical sections on static analysis, security, concurrency and program verification.
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005. The 17 revised papers presented together with the extended abstract of one invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, and many other topics.
The ultimate goal of program verification is not the theory behind the tools or the tools themselves, but the application of the theory and tools in the software engineering process. Our society relies on the correctness of a vast and growing amount of software. Improving the software engineering process is an important, long-term goal with many steps. Two of those steps are the KeY tool and this KeY book.
The Java programming language provides safety and security guarantees such as type safety and its security architecture. They distinguish it from other mainstream programming languages like C and C++. In this work, we develop a machine-checked model of concurrent Java and the Java memory model and investigate the impact of concurrency on these guarantees. From the formal model, we automatically obtain an executable verified compiler to bytecode and a validated virtual machine.
This book constitutes the strictly refereed post-workshop proceedings of the 12th International Workshop on Computer Science Logic, CSL '98, held as the Annual Conference of the European Association on Computer Science Logic in Brno, Czech Republic in August 1998. The 25 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and revision. Also included are three reviewed invited papers. The papers span the whole scope of computer science logic and mathematical foundations and represent the state of the art in the area.
This book constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. The 14 revised full papers presented were carefully reviewed and selected from 25 submissions. The papers are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; semantics and analysis of modern programming languages; probabilistic models for concurrency; and testing and run-time verification.