Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Proceedings{autexier_et_al:OASIcs.TrustworthySW.2006, title = {{OASIcs, Volume 3, Trustworthy SW'06, Complete Volume}}, booktitle = {Workshop on Trustworthy Software}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2012}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006}, URN = {urn:nbn:de:0030-drops-35659}, doi = {10.4230/OASIcs.TrustworthySW.2006}, annote = {Keywords: Software/Program Verification} }
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. i-vi, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.693, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Preface -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {i--vi}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.693}, URN = {urn:nbn:de:0030-drops-6932}, doi = {10.4230/OASIcs.TrustworthySW.2006.693}, annote = {Keywords: Trustworthy software, preface} }
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper. Abstracts Collection -- Workshop Trustworthy Software 2006. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.758, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Abstracts Collection -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--7}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.758}, URN = {urn:nbn:de:0030-drops-7588}, doi = {10.4230/OASIcs.TrustworthySW.2006.758}, annote = {Keywords: Software evolution, Modularity, Automated debugging, Dependability assurance, Failure analysis, Static program analysis, Infinite and Finite-state verification, Runtime verification, Theorem proving, Access control, Security analysis, Security protocols, E-Voting} }
Axel Legay, Luca de Alfaro, and Marco Faella. An Introduction to the Tool Ticc. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-32, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{legay_et_al:OASIcs.TrustworthySW.2006.766, author = {Legay, Axel and de Alfaro, Luca and Faella, Marco}, title = {{An Introduction to the Tool Ticc}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--32}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.766}, URN = {urn:nbn:de:0030-drops-7667}, doi = {10.4230/OASIcs.TrustworthySW.2006.766}, annote = {Keywords: Open system, game, interface automata} }
Arnaud Lanoix, Dieu-Donné Okalas Ossami, and Jeanine Souquières. An Operator-based Approach to Incremental Development of Conform Protocol State Machines. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{lanoix_et_al:OASIcs.TrustworthySW.2006.695, author = {Lanoix, Arnaud and Okalas Ossami, Dieu-Donn\'{e} and Souqui\`{e}res, Jeanine}, title = {{An Operator-based Approach to Incremental Development of Conform Protocol State Machines}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.695}, URN = {urn:nbn:de:0030-drops-6953}, doi = {10.4230/OASIcs.TrustworthySW.2006.695}, annote = {Keywords: Protocol state machine, incremental development, development operator, exact conformance, plugin conformance, partial conformance} }
Björn Wachter. Explaining Data Type Reduction in the Shape Analysis Framework. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{wachter:OASIcs.TrustworthySW.2006.701, author = {Wachter, Bj\"{o}rn}, title = {{Explaining Data Type Reduction in the Shape Analysis Framework}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.701}, URN = {urn:nbn:de:0030-drops-7016}, doi = {10.4230/OASIcs.TrustworthySW.2006.701}, annote = {Keywords: Canonical abstraction, data type reduction, model checking, parameterized system, infinite-state} }
Claude Kirchner, Pierre-Etienne Moreau, and Antoine Reilles. Formal Validation of Pattern Matching code. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{kirchner_et_al:OASIcs.TrustworthySW.2006.697, author = {Kirchner, Claude and Moreau, Pierre-Etienne and Reilles, Antoine}, title = {{Formal Validation of Pattern Matching code}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--22}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.697}, URN = {urn:nbn:de:0030-drops-6978}, doi = {10.4230/OASIcs.TrustworthySW.2006.697}, annote = {Keywords: Correctness proofs, compilers, pattern matching, validation} }
Julien Schmaltz and Dominique Borrione. Formalizing On Chip Communications in a Functional Style. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schmaltz_et_al:OASIcs.TrustworthySW.2006.700, author = {Schmaltz, Julien and Borrione, Dominique}, title = {{Formalizing On Chip Communications in a Functional Style}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--25}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.700}, URN = {urn:nbn:de:0030-drops-7000}, doi = {10.4230/OASIcs.TrustworthySW.2006.700}, annote = {Keywords: SoC's, communication architectures, formal methods, automated theorem proving} }
Stephan Neuhaus. Isolating Intrusions by Automatic Experiments. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{neuhaus:OASIcs.TrustworthySW.2006.696, author = {Neuhaus, Stephan}, title = {{Isolating Intrusions by Automatic Experiments}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--3}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.696}, URN = {urn:nbn:de:0030-drops-6960}, doi = {10.4230/OASIcs.TrustworthySW.2006.696}, annote = {Keywords: Intrusion Analysis, Malware, Experimentation} }
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} }
Michael Hilker and Christoph Schommer. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{hilker_et_al:OASIcs.TrustworthySW.2006.694, author = {Hilker, Michael and Schommer, Christoph}, title = {{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--9}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.694}, URN = {urn:nbn:de:0030-drops-6949}, doi = {10.4230/OASIcs.TrustworthySW.2006.694}, annote = {Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste} }
Jan Reineke. Shape Analysis of Sets. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{reineke:OASIcs.TrustworthySW.2006.698, author = {Reineke, Jan}, title = {{Shape Analysis of Sets}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--19}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.698}, URN = {urn:nbn:de:0030-drops-6980}, doi = {10.4230/OASIcs.TrustworthySW.2006.698}, annote = {Keywords: Shape analysis, adt, algebraic specification, invariants, verification, set implementations, imperative programs} }
Ina Schaefer and Arnd Poetzsch-Heffter. Using Abstraction in Modular Verification of Synchronous Adaptive Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schaefer_et_al:OASIcs.TrustworthySW.2006.699, author = {Schaefer, Ina and Poetzsch-Heffter, Arnd}, title = {{Using Abstraction in Modular Verification of Synchronous Adaptive Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.699}, URN = {urn:nbn:de:0030-drops-6996}, doi = {10.4230/OASIcs.TrustworthySW.2006.699}, annote = {Keywords: Dependable Embedded Systems, Self-Adaptation, Abstraction, Modular Verification} }
Feedback for Dagstuhl Publishing