OASIcs, Volume 3
TrustworthySW 2006, May 18-19, 2006, Saarbruecken, Germany
Editors: Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Proceedings{autexier_et_al:OASIcs.TrustworthySW.2006, title = {{OASIcs, Volume 3, Trustworthy SW'06, Complete Volume}}, booktitle = {Workshop on Trustworthy Software}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2012}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006}, URN = {urn:nbn:de:0030-drops-35659}, doi = {10.4230/OASIcs.TrustworthySW.2006}, annote = {Keywords: Software/Program Verification} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Axel Legay, Luca de Alfaro, and Marco Faella. An Introduction to the Tool Ticc. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-32, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{legay_et_al:OASIcs.TrustworthySW.2006.766, author = {Legay, Axel and de Alfaro, Luca and Faella, Marco}, title = {{An Introduction to the Tool Ticc}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--32}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.766}, URN = {urn:nbn:de:0030-drops-7667}, doi = {10.4230/OASIcs.TrustworthySW.2006.766}, annote = {Keywords: Open system, game, interface automata} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper. Abstracts Collection -- Workshop Trustworthy Software 2006. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.758, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Abstracts Collection -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--7}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.758}, URN = {urn:nbn:de:0030-drops-7588}, doi = {10.4230/OASIcs.TrustworthySW.2006.758}, annote = {Keywords: Software evolution, Modularity, Automated debugging, Dependability assurance, Failure analysis, Static program analysis, Infinite and Finite-state verification, Runtime verification, Theorem proving, Access control, Security analysis, Security protocols, E-Voting} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. i-vi, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.693, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Preface -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {i--vi}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.693}, URN = {urn:nbn:de:0030-drops-6932}, doi = {10.4230/OASIcs.TrustworthySW.2006.693}, annote = {Keywords: Trustworthy software, preface} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Arnaud Lanoix, Dieu-Donné Okalas Ossami, and Jeanine Souquières. An Operator-based Approach to Incremental Development of Conform Protocol State Machines. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{lanoix_et_al:OASIcs.TrustworthySW.2006.695, author = {Lanoix, Arnaud and Okalas Ossami, Dieu-Donn\'{e} and Souqui\`{e}res, Jeanine}, title = {{An Operator-based Approach to Incremental Development of Conform Protocol State Machines}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.695}, URN = {urn:nbn:de:0030-drops-6953}, doi = {10.4230/OASIcs.TrustworthySW.2006.695}, annote = {Keywords: Protocol state machine, incremental development, development operator, exact conformance, plugin conformance, partial conformance} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Björn Wachter. Explaining Data Type Reduction in the Shape Analysis Framework. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{wachter:OASIcs.TrustworthySW.2006.701, author = {Wachter, Bj\"{o}rn}, title = {{Explaining Data Type Reduction in the Shape Analysis Framework}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.701}, URN = {urn:nbn:de:0030-drops-7016}, doi = {10.4230/OASIcs.TrustworthySW.2006.701}, annote = {Keywords: Canonical abstraction, data type reduction, model checking, parameterized system, infinite-state} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Claude Kirchner, Pierre-Etienne Moreau, and Antoine Reilles. Formal Validation of Pattern Matching code. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{kirchner_et_al:OASIcs.TrustworthySW.2006.697, author = {Kirchner, Claude and Moreau, Pierre-Etienne and Reilles, Antoine}, title = {{Formal Validation of Pattern Matching code}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--22}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.697}, URN = {urn:nbn:de:0030-drops-6978}, doi = {10.4230/OASIcs.TrustworthySW.2006.697}, annote = {Keywords: Correctness proofs, compilers, pattern matching, validation} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Julien Schmaltz and Dominique Borrione. Formalizing On Chip Communications in a Functional Style. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schmaltz_et_al:OASIcs.TrustworthySW.2006.700, author = {Schmaltz, Julien and Borrione, Dominique}, title = {{Formalizing On Chip Communications in a Functional Style}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--25}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.700}, URN = {urn:nbn:de:0030-drops-7000}, doi = {10.4230/OASIcs.TrustworthySW.2006.700}, annote = {Keywords: SoC's, communication architectures, formal methods, automated theorem proving} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Stephan Neuhaus. Isolating Intrusions by Automatic Experiments. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{neuhaus:OASIcs.TrustworthySW.2006.696, author = {Neuhaus, Stephan}, title = {{Isolating Intrusions by Automatic Experiments}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--3}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.696}, URN = {urn:nbn:de:0030-drops-6960}, doi = {10.4230/OASIcs.TrustworthySW.2006.696}, annote = {Keywords: Intrusion Analysis, Malware, Experimentation} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Michael Hilker and Christoph Schommer. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{hilker_et_al:OASIcs.TrustworthySW.2006.694, author = {Hilker, Michael and Schommer, Christoph}, title = {{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--9}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.694}, URN = {urn:nbn:de:0030-drops-6949}, doi = {10.4230/OASIcs.TrustworthySW.2006.694}, annote = {Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Jan Reineke. Shape Analysis of Sets. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{reineke:OASIcs.TrustworthySW.2006.698, author = {Reineke, Jan}, title = {{Shape Analysis of Sets}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--19}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.698}, URN = {urn:nbn:de:0030-drops-6980}, doi = {10.4230/OASIcs.TrustworthySW.2006.698}, annote = {Keywords: Shape analysis, adt, algebraic specification, invariants, verification, set implementations, imperative programs} }
Published in: OASIcs, Volume 3, Workshop on Trustworthy Software (2006)
Ina Schaefer and Arnd Poetzsch-Heffter. Using Abstraction in Modular Verification of Synchronous Adaptive Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schaefer_et_al:OASIcs.TrustworthySW.2006.699, author = {Schaefer, Ina and Poetzsch-Heffter, Arnd}, title = {{Using Abstraction in Modular Verification of Synchronous Adaptive Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.699}, URN = {urn:nbn:de:0030-drops-6996}, doi = {10.4230/OASIcs.TrustworthySW.2006.699}, annote = {Keywords: Dependable Embedded Systems, Self-Adaptation, Abstraction, Modular Verification} }
Feedback for Dagstuhl Publishing