Book Volume 10160 2017

Concurrency, Security, and Puzzles

Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday

Editors:

ISBN: 978-3-319-51045-3 (Print) 978-3-319-51046-0 (Online)

Table of contents (15 chapters)

  1. Front Matter

    Pages I-XVIII

  2. No Access

    Chapter

    Pages 1-17

    Stealthy Protocols: Metrics and Open Problems

  3. No Access

    Chapter

    Pages 18-38

    A Specification Theory of Real-Time Processes

  4. No Access

    Chapter

    Pages 39-64

    Towards Verification of Cyber-Physical Systems with UTP and Isabelle/HOL

  5. No Access

    Chapter

    Pages 65-87

    FDR: From Theory to Industrial Application

  6. No Access

    Chapter

    Pages 88-103

    Information Flow, Distributed Systems, and Refinement, by Example

  7. No Access

    Chapter

    Pages 104-123

    Abstractions for Transition Systems with Applications to Stubborn Sets

  8. No Access

    Chapter

    Pages 124-143

    A Hybrid Relational Modelling Language

  9. No Access

    Chapter

    Pages 144-161

    What Makes Petri Nets Harder to Verify: Stack or Data?

  10. No Access

    Chapter

    Pages 162-184

    Analysing Lock-Free Linearizable Datatypes Using CSP

  11. No Access

    Chapter

    Pages 185-202

    Discrete Random Variables Over Domains, Revisited

  12. No Access

    Chapter

    Pages 203-222

    A Demonic Lattice of Information

  13. No Access

    Chapter

    Pages 223-245

    A Brief History of Security Protocols

  14. No Access

    Chapter

    Pages 246-271

    More Stubborn Set Methods for Process Algebras

  15. No Access

    Chapter

    Pages 272-293

    A Branching Time Model of CSP

  16. No Access

    Chapter

    Pages 294-318

    Virtualization Based Development

  17. Back Matter

    Pages 319-319