10.4230/OASICS.TRUSTWORTHYSW.2006.758
Autexier, Serge
Serge
Autexier
Merz, Stephan
Stephan
Merz
van der Torre, Leon
Leon
van der Torre
Wilhelm, Reinhard
Reinhard
Wilhelm
Wolper, Pierre
Pierre
Wolper
Abstracts Collection -- Workshop Trustworthy Software 2006
Schloss Dagstuhl – Leibniz-Zentrum für Informatik
2006
Article
Software evolution
Modularity
Automated debugging
Dependability assurance
Failure analysis
Static program analysis
Infinite and Finite-state verification
Runtime verification
Theorem proving
Access control
Security analysis
Security protocols
E-Voting
Autexier, Serge
Serge
Autexier
Merz, Stephan
Stephan
Merz
van der Torre, Leon
Leon
van der Torre
Wilhelm, Reinhard
Reinhard
Wilhelm
Wolper, Pierre
Pierre
Wolper
2006
2006-10-02
2006-10-02
2006-10-02
en
urn:nbn:de:0030-drops-7588
10.4230/OASIcs.TrustworthySW.2006
978-3-939897-02-6
2190-6807
10.4230/OASIcs.TrustworthySW.2006
OASIcs, Volume 3, TrustworthySW 2006
Workshop on Trustworthy Software
2012
3
1
1
7
Schloss Dagstuhl – Leibniz-Zentrum für Informatik
Autexier, Serge
Serge
Autexier
Merz, Stephan
Stephan
Merz
van der Torre, Leon
Leon
van der Torre
Wilhelm, Reinhard
Reinhard
Wilhelm
Wolper, Pierre
Pierre
Wolper
2190-6807
Open Access Series in Informatics (OASIcs)
2006
3
Schloss Dagstuhl – Leibniz-Zentrum für Informatik
7 pages
150294 bytes
application/pdf
Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported license
info:eu-repo/semantics/openAccess
On 18-19 May 2006, the Saarland University organized a two-day
workshop about "Trustworthy Software" in order to present and foster
the research competence in the SaarLorLuxWallonie region in the area
of developing safe, secure and reliable software, computers and
networks. As part of the Interreg III C E-Bird project "Recherches
sans fronti\`eres/Forschen ohne Grenzen" it provided an excellent forum
especially for young scientists to present and discuss recent results,
new ideas and future research directions to a transnational audience
from the SaarLorLuxWallonie region. The workshop consisted of 21
regular presentations and one invited talk. Abstracts of all
presentations are collected in this paper, including links to extended
abstracts or full papers. The first section directs to the preface of
the proceedings.
OASIcs, Vol. 3, Workshop on Trustworthy Software, pages 1-7