-
1
-
-
23844484364
-
The use of Z
-
[Barden et al. 1992], John E. Nicholls, editor, Springer Verlag
-
et al. 1992] Rosalind Barden, Susan Stepney, and David Cooper. The use of Z. In John E. Nicholls, editor, Proceedings of the 6th Annual Z User Meeting, York 1991, Workshops in Computing, pages 99-124. Springer Verlag, 1992.
-
(1992)
Proceedings of the 6Th Annual Z User Meeting, York 1991, Workshops in Computing
, pp. 99-124
-
-
Barden, R.1
Stepney, S.2
Cooper, D.3
-
4
-
-
0023861504
-
Concerning "modelling" of computer security
-
[Bell 1988], IEEE Computer Society Press, April
-
1988] D. E. Bell. Concerning "modelling" of computer security. In Proceedings 1988 IEEE Symposium on Security and Privacy, pages 8-13. IEEE Computer Society Press, April 1988.
-
(1988)
Proceedings 1988 IEEE Symposium on Security and Privacy
, pp. 8-13
-
-
Bell, D.E.1
-
7
-
-
37549038503
-
Formaliser—an interactive support tool for Z
-
[Flynn et al. 1990], John E. Nicholls, editor, Oxford 1989, Workshops in Computing, pages 128-141. Springer Verlag
-
et al. 1990] Mike Flynn, Tim Hoverd, and David Brazier. Formaliser—an interactive support tool for Z. In John E. Nicholls, editor, Z User Workshop: Proceedings of the 4th Annual Z User Meeting, Oxford 1989, Workshops in Computing, pages 128-141. Springer Verlag, 1990.
-
(1990)
Z User Workshop: Proceedings of the 4Th Annual Z User Meeting
-
-
Flynn, M.1
Hoverd, T.2
Brazier, D.3
-
9
-
-
0004256091
-
-
[Gollman 1998], John Wiley
-
1998] Dieter Gollman. Computer Security. John Wiley, 1998.
-
(1998)
Computer Security
-
-
-
10
-
-
84974756266
-
Basic theorems about security
-
[Jacob 1992]
-
1992] Jeremy L. Jacob. Basic theorems about security. Journal of Computer Security, 1(4):385-411, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.4
, pp. 385-411
-
-
Jacob, J.L.1
-
11
-
-
84919231256
-
-
[Josephs 1991], Technical Report TR-19-91, Programming Research Group, Oxford University Computing Laboratory
-
1991] Mark B. Josephs. Specifying reactive systems in Z. Technical Report TR-19-91, Programming Research Group, Oxford University Computing Laboratory, 1991.
-
(1991)
Specifying Reactive Systems in Z
-
-
Josephs, M.B.1
-
12
-
-
0029232082
-
CSP and determinism in security modelling
-
[Roscoe 1995], IEEE Computer Society Press
-
1995] A. W. Roscoe. CSP and determinism in security modelling. In Proceedings 1995 IEEE Symposium on Security and Privacy, pages 114-127. IEEE Computer Society Press, 1995.
-
(1995)
Proceedings 1995 IEEE Symposium on Security and Privacy
, pp. 114-127
-
-
Roscoe, A.W.1
-
17
-
-
84957619083
-
More powerful Z data refinement: Pushing the state of the art in industrial refinement
-
[Stepney et al. 1998], Jonathan P. Bowen, Andreas Fett, and Michael G. Hinchey, editors, Springer Verlag
-
et al. 1998] Susan Stepney, David Cooper, and Jim Woodcock. More powerful Z data refinement: pushing the state of the art in industrial refinement. In Jonathan P. Bowen, Andreas Fett, and Michael G. Hinchey, editors, ZUM'98: 11th International Conference of Z Users, Berlin 1998, volume 1493 of Lecture Notes in Computer Science, pages 284-307. Springer Verlag, 1998.
-
(1998)
ZUM'98: 11Th International Conference of Z Users, Berlin 1998, Volume 1493 of Lecture Notes in Computer Science
, pp. 284-307
-
-
Stepney, S.1
Cooper, D.2
Woodcock, J.3
-
18
-
-
84937443628
-
Formal reasoning in the Z notation using CADiZ
-
[Toyn 1996], In N. A. Merriam, editor, Department of Computer Science, University of York, July
-
1996] Ian Toyn. Formal reasoning in the Z notation using CADiZ. In N. A. Merriam, editor, 2nd International Workshop on User Interface Design for Theorem Proving Systems. Department of Computer Science, University of York, July 1996. http://www.cs.york.ac.uk/~ian/cadiz/.
-
(1996)
2Nd International Workshop on User Interface Design for Theorem Proving Systems
-
-
Toyn, I.1
|