Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Proceedings{autexier_et_al:OASIcs.TrustworthySW.2006,
title = {{OASIcs, Volume 3, Trustworthy SW'06, Complete Volume}},
booktitle = {Workshop on Trustworthy Software},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2012},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006},
URN = {urn:nbn:de:0030-drops-35659},
doi = {10.4230/OASIcs.TrustworthySW.2006},
annote = {Keywords: Software/Program Verification}
}
Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. i-vi, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.693,
author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
title = {{Preface -- Workshop Trustworthy Software 2006}},
booktitle = {Workshop on Trustworthy Software},
pages = {i--vi},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.693},
URN = {urn:nbn:de:0030-drops-6932},
doi = {10.4230/OASIcs.TrustworthySW.2006.693},
annote = {Keywords: Trustworthy software, preface}
}
Serge Autexier, Stephan Merz, Leon van der Torre, Reinhard Wilhelm, and Pierre Wolper. Abstracts Collection -- Workshop Trustworthy Software 2006. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-7, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.758,
author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
title = {{Abstracts Collection -- Workshop Trustworthy Software 2006}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--7},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.758},
URN = {urn:nbn:de:0030-drops-7588},
doi = {10.4230/OASIcs.TrustworthySW.2006.758},
annote = {Keywords: Software evolution, Modularity, Automated debugging, Dependability assurance, Failure analysis, Static program analysis, Infinite and Finite-state verification, Runtime verification, Theorem proving, Access control, Security analysis, Security protocols, E-Voting}
}
Axel Legay, Luca de Alfaro, and Marco Faella. An Introduction to the Tool Ticc. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-32, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{legay_et_al:OASIcs.TrustworthySW.2006.766,
author = {Legay, Axel and de Alfaro, Luca and Faella, Marco},
title = {{An Introduction to the Tool Ticc}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--32},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.766},
URN = {urn:nbn:de:0030-drops-7667},
doi = {10.4230/OASIcs.TrustworthySW.2006.766},
annote = {Keywords: Open system, game, interface automata}
}
Arnaud Lanoix, Dieu-Donné Okalas Ossami, and Jeanine Souquières. An Operator-based Approach to Incremental Development of Conform Protocol State Machines. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{lanoix_et_al:OASIcs.TrustworthySW.2006.695,
author = {Lanoix, Arnaud and Okalas Ossami, Dieu-Donn\'{e} and Souqui\`{e}res, Jeanine},
title = {{An Operator-based Approach to Incremental Development of Conform Protocol State Machines}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--14},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.695},
URN = {urn:nbn:de:0030-drops-6953},
doi = {10.4230/OASIcs.TrustworthySW.2006.695},
annote = {Keywords: Protocol state machine, incremental development, development operator, exact conformance, plugin conformance, partial conformance}
}
Björn Wachter. Explaining Data Type Reduction in the Shape Analysis Framework. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-6, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{wachter:OASIcs.TrustworthySW.2006.701,
author = {Wachter, Bj\"{o}rn},
title = {{Explaining Data Type Reduction in the Shape Analysis Framework}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--6},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.701},
URN = {urn:nbn:de:0030-drops-7016},
doi = {10.4230/OASIcs.TrustworthySW.2006.701},
annote = {Keywords: Canonical abstraction, data type reduction, model checking, parameterized system, infinite-state}
}
Claude Kirchner, Pierre-Etienne Moreau, and Antoine Reilles. Formal Validation of Pattern Matching code. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{kirchner_et_al:OASIcs.TrustworthySW.2006.697,
author = {Kirchner, Claude and Moreau, Pierre-Etienne and Reilles, Antoine},
title = {{Formal Validation of Pattern Matching code}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--22},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.697},
URN = {urn:nbn:de:0030-drops-6978},
doi = {10.4230/OASIcs.TrustworthySW.2006.697},
annote = {Keywords: Correctness proofs, compilers, pattern matching, validation}
}
Julien Schmaltz and Dominique Borrione. Formalizing On Chip Communications in a Functional Style. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-25, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schmaltz_et_al:OASIcs.TrustworthySW.2006.700,
author = {Schmaltz, Julien and Borrione, Dominique},
title = {{Formalizing On Chip Communications in a Functional Style}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--25},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.700},
URN = {urn:nbn:de:0030-drops-7000},
doi = {10.4230/OASIcs.TrustworthySW.2006.700},
annote = {Keywords: SoC's, communication architectures, formal methods, automated theorem proving}
}
Stephan Neuhaus. Isolating Intrusions by Automatic Experiments. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-3, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{neuhaus:OASIcs.TrustworthySW.2006.696,
author = {Neuhaus, Stephan},
title = {{Isolating Intrusions by Automatic Experiments}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--3},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.696},
URN = {urn:nbn:de:0030-drops-6960},
doi = {10.4230/OASIcs.TrustworthySW.2006.696},
annote = {Keywords: Intrusion Analysis, Malware, Experimentation}
}
Eugen Zalinescu, Véronique Cortier, and Michaël Rusinowitch. Relating two standard notions of secrecy. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-29, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691,
author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l},
title = {{Relating two standard notions of secrecy}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--29},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691},
URN = {urn:nbn:de:0030-drops-6911},
doi = {10.4230/OASIcs.TrustworthySW.2006.691},
annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus}
}
Michael Hilker and Christoph Schommer. SANA - Security Analysis in Internet Traffic through Artificial Immune Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-9, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{hilker_et_al:OASIcs.TrustworthySW.2006.694,
author = {Hilker, Michael and Schommer, Christoph},
title = {{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--9},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.694},
URN = {urn:nbn:de:0030-drops-6949},
doi = {10.4230/OASIcs.TrustworthySW.2006.694},
annote = {Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste}
}
Jan Reineke. Shape Analysis of Sets. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{reineke:OASIcs.TrustworthySW.2006.698,
author = {Reineke, Jan},
title = {{Shape Analysis of Sets}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--19},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.698},
URN = {urn:nbn:de:0030-drops-6980},
doi = {10.4230/OASIcs.TrustworthySW.2006.698},
annote = {Keywords: Shape analysis, adt, algebraic specification, invariants, verification, set implementations, imperative programs}
}
Ina Schaefer and Arnd Poetzsch-Heffter. Using Abstraction in Modular Verification of Synchronous Adaptive Systems. In Workshop on Trustworthy Software. Open Access Series in Informatics (OASIcs), Volume 3, pp. 1-14, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2006)
@InProceedings{schaefer_et_al:OASIcs.TrustworthySW.2006.699,
author = {Schaefer, Ina and Poetzsch-Heffter, Arnd},
title = {{Using Abstraction in Modular Verification of Synchronous Adaptive Systems}},
booktitle = {Workshop on Trustworthy Software},
pages = {1--14},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-939897-02-6},
ISSN = {2190-6807},
year = {2006},
volume = {3},
editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.699},
URN = {urn:nbn:de:0030-drops-6996},
doi = {10.4230/OASIcs.TrustworthySW.2006.699},
annote = {Keywords: Dependable Embedded Systems, Self-Adaptation, Abstraction, Modular Verification}
}