Software System Reliability and Security
M. Broy, Johannes Grünbauer
IOS Press, Jan 1, 2007 - Computers - 417 pages
"Information security covers the protection of information against unauthorized disclosure, transfer, modification, and destruction, whether accidentally or intentionally. Quality of life in general and of individual citizens, and the effectiveness of the economy critically depends on our ability to build software in a transparent and efficient way. Furthermore, we must be able to enhance the software development process systematically in order to ensure software's safety and security. This, in turn, requires very high software reliability, i.e., an extremely high confidence in the ability of the software to perform flawlessly. Foundations of software technology provide models that enable us to capture application domains and their requirements, but also to understand the structure and working of software systems and software architectures. Based on these foundations tools allow to prove and ensure the correctness of software's functioning. New developments must pay due diligence to the importance of security-related aspects, and align current methods and techniques to information security, integrity, and system reliability. The articles in this book describe the state-of-the-art ideas on how to meet these challenges in software engineering."
What people are saying - Write a review
We haven't found any reviews in the usual places.
Specifying Relating and Composing Object Oriented Interfaces Components
Using Invariants to Reason About Cryptographic Protocols
Verified Interoperable Implementations of Security Protocols
8 other sections not shown
Other editions - View all
A. D. Gordon abstract algorithm anti-goal assert assume authentication automaton Biichi automata BoogiePL1 bool bytes calculus call stack client components condition configuration constructor correctness cryptographic cryptographic protocols declared defined definition denotational semantics denote design by contract domain encryption entry example execution exit export export/import interface expression Figure formal formal verification formula function goal model hardware identifiers implementation infinite inline assembler input invariant kernel language machine method invocation model-checking mythread nested tree nested words node nonce null object invariants object orientation object-oriented programs operation page fault postcondition precondition principal processor properties protocol ProVerif reachable refinement requirements satisfies scenarios Section semantics sequence slot Spec1 specification by contract statement syntactic Theorem thread tion token transaction transition transition relation translation trust root variables verification WS-Security