@Proceedings{autexier_et_al:OASIcs.TrustworthySW.2006, title = {{OASIcs, Volume 3, Trustworthy SW'06, Complete Volume}}, booktitle = {Workshop on Trustworthy Software}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2012}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006}, URN = {urn:nbn:de:0030-drops-35659}, doi = {10.4230/OASIcs.TrustworthySW.2006}, annote = {Keywords: Software/Program Verification} } @InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.693, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Preface -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {i--vi}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.693}, URN = {urn:nbn:de:0030-drops-6932}, doi = {10.4230/OASIcs.TrustworthySW.2006.693}, annote = {Keywords: Trustworthy software, preface} } @InProceedings{autexier_et_al:OASIcs.TrustworthySW.2006.758, author = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, title = {{Abstracts Collection -- Workshop Trustworthy Software 2006}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--7}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.758}, URN = {urn:nbn:de:0030-drops-7588}, doi = {10.4230/OASIcs.TrustworthySW.2006.758}, annote = {Keywords: Software evolution, Modularity, Automated debugging, Dependability assurance, Failure analysis, Static program analysis, Infinite and Finite-state verification, Runtime verification, Theorem proving, Access control, Security analysis, Security protocols, E-Voting} } @InProceedings{legay_et_al:OASIcs.TrustworthySW.2006.766, author = {Legay, Axel and de Alfaro, Luca and Faella, Marco}, title = {{An Introduction to the Tool Ticc}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--32}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.766}, URN = {urn:nbn:de:0030-drops-7667}, doi = {10.4230/OASIcs.TrustworthySW.2006.766}, annote = {Keywords: Open system, game, interface automata} } @InProceedings{lanoix_et_al:OASIcs.TrustworthySW.2006.695, author = {Lanoix, Arnaud and Okalas Ossami, Dieu-Donn\'{e} and Souqui\`{e}res, Jeanine}, title = {{An Operator-based Approach to Incremental Development of Conform Protocol State Machines}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.695}, URN = {urn:nbn:de:0030-drops-6953}, doi = {10.4230/OASIcs.TrustworthySW.2006.695}, annote = {Keywords: Protocol state machine, incremental development, development operator, exact conformance, plugin conformance, partial conformance} } @InProceedings{wachter:OASIcs.TrustworthySW.2006.701, author = {Wachter, Bj\"{o}rn}, title = {{Explaining Data Type Reduction in the Shape Analysis Framework}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--6}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.701}, URN = {urn:nbn:de:0030-drops-7016}, doi = {10.4230/OASIcs.TrustworthySW.2006.701}, annote = {Keywords: Canonical abstraction, data type reduction, model checking, parameterized system, infinite-state} } @InProceedings{kirchner_et_al:OASIcs.TrustworthySW.2006.697, author = {Kirchner, Claude and Moreau, Pierre-Etienne and Reilles, Antoine}, title = {{Formal Validation of Pattern Matching code}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--22}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.697}, URN = {urn:nbn:de:0030-drops-6978}, doi = {10.4230/OASIcs.TrustworthySW.2006.697}, annote = {Keywords: Correctness proofs, compilers, pattern matching, validation} } @InProceedings{schmaltz_et_al:OASIcs.TrustworthySW.2006.700, author = {Schmaltz, Julien and Borrione, Dominique}, title = {{Formalizing On Chip Communications in a Functional Style}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--25}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.700}, URN = {urn:nbn:de:0030-drops-7000}, doi = {10.4230/OASIcs.TrustworthySW.2006.700}, annote = {Keywords: SoC's, communication architectures, formal methods, automated theorem proving} } @InProceedings{neuhaus:OASIcs.TrustworthySW.2006.696, author = {Neuhaus, Stephan}, title = {{Isolating Intrusions by Automatic Experiments}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--3}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.696}, URN = {urn:nbn:de:0030-drops-6960}, doi = {10.4230/OASIcs.TrustworthySW.2006.696}, annote = {Keywords: Intrusion Analysis, Malware, Experimentation} } @InProceedings{zalinescu_et_al:OASIcs.TrustworthySW.2006.691, author = {Zalinescu, Eugen and Cortier, V\'{e}ronique and Rusinowitch, Micha\"{e}l}, title = {{Relating two standard notions of secrecy}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--29}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.691}, URN = {urn:nbn:de:0030-drops-6911}, doi = {10.4230/OASIcs.TrustworthySW.2006.691}, annote = {Keywords: Verification, security protocols, secrecy, applied-pi calculus} } @InProceedings{hilker_et_al:OASIcs.TrustworthySW.2006.694, author = {Hilker, Michael and Schommer, Christoph}, title = {{SANA - Security Analysis in Internet Traffic through Artificial Immune Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--9}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.694}, URN = {urn:nbn:de:0030-drops-6949}, doi = {10.4230/OASIcs.TrustworthySW.2006.694}, annote = {Keywords: Artificial Immune Systems, Network Security, Intrusion Detection, Artificial Cell Communication, Biological-Inspired Computing, Complex Adaptive Syste} } @InProceedings{reineke:OASIcs.TrustworthySW.2006.698, author = {Reineke, Jan}, title = {{Shape Analysis of Sets}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--19}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.698}, URN = {urn:nbn:de:0030-drops-6980}, doi = {10.4230/OASIcs.TrustworthySW.2006.698}, annote = {Keywords: Shape analysis, adt, algebraic specification, invariants, verification, set implementations, imperative programs} } @InProceedings{schaefer_et_al:OASIcs.TrustworthySW.2006.699, author = {Schaefer, Ina and Poetzsch-Heffter, Arnd}, title = {{Using Abstraction in Modular Verification of Synchronous Adaptive Systems}}, booktitle = {Workshop on Trustworthy Software}, pages = {1--14}, series = {Open Access Series in Informatics (OASIcs)}, ISBN = {978-3-939897-02-6}, ISSN = {2190-6807}, year = {2006}, volume = {3}, editor = {Autexier, Serge and Merz, Stephan and van der Torre, Leon and Wilhelm, Reinhard and Wolper, Pierre}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/OASIcs.TrustworthySW.2006.699}, URN = {urn:nbn:de:0030-drops-6996}, doi = {10.4230/OASIcs.TrustworthySW.2006.699}, annote = {Keywords: Dependable Embedded Systems, Self-Adaptation, Abstraction, Modular Verification} }