-
2
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
20444495150
-
Common criteria for information technology security evaluation version 2.1
-
Technical report
-
Common criteria for information technology security evaluation version 2.1. Technical report, 1999. URL: http://www.commoncriteria.org/docs/index.html.
-
(1999)
-
-
-
4
-
-
0037917942
-
Common criteria for information technology security evaluation supplement: Vulnerability analysis and penetration testing
-
Technical report
-
Common criteria for information technology security evaluation supplement: Vulnerability analysis and penetration testing. Technical report, 2002. URL: http://www.commoncriteria.org/review_docs/index.html.
-
(2002)
-
-
-
6
-
-
34548747288
-
Towards a living software development process based on process patterns
-
In V. Ambriola, editor; Springer
-
M. Grantz, F. Marschall, G. Popp, A. Rausch, and W. Schwerin. Towards a living software development process based on process patterns. In V. Ambriola, editor, Proceedings of the Eight European Workshop on Software Process Technology 2001, Lecture Notes in Computer Science 2077, pages 182-202. Springer, 2001
-
(2001)
Proceedings of the Eight European Workshop on Software Process Technology 2001, Lecture Notes in Computer Science 2077
, pp. 182-202
-
-
Grantz, M.1
Marschall, F.2
Popp, G.3
Rausch, A.4
Schwerin, W.5
-
7
-
-
0003422822
-
Tool supported specification and simulation of distributed systems
-
F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155-164, 1998.
-
(1998)
International Symposium on Software Engineering for Parallel and Distributed Systems
, pp. 155-164
-
-
Huber, F.1
Molterer, S.2
Rausch, A.3
Schätz, B.4
Sihling, M.5
Slotosch, O.6
-
8
-
-
77950064308
-
Traffic lights - An autofocus case study
-
IEEE Computer Society
-
F. Huber, S. Molterer, B. Schätz, O. Slotosch, and A. Vilbig. Traffic Lights - An AutoFocus Case Study. In 1998 International Conference on Application of Concurrency to System Design, pages 282-294. IEEE Computer Society, 1998
-
(1998)
1998 International Conference on Application of Concurrency to System Design
, pp. 282-294
-
-
Huber, F.1
Molterer, S.2
Schätz, B.3
Slotosch, O.4
Vilbig, A.5
-
9
-
-
0037579920
-
-
(in German)
-
IABG. V-Modell 97, 1999. URL:http://www.-modell.iabg.de/ (in German).
-
(1999)
IABG. V-Modell 97
-
-
-
10
-
-
0038594099
-
-
ITSEC. Information Technology Security Evaluation Criteria-Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, May 1990. Version 1
-
ITSEC. Information Technology Security Evaluation Criteria-Harmonised Criteria of France, Germany, the Netherlands, the United Kingdom, May 1990. Version 1.
-
-
-
-
12
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
In Margaria and Steffen, editors; Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of Lecture Notes on Computer Science, pages 147-166, Springer, 1996.
-
(1996)
TACAS, Volume 1055 of Lecture Notes on Computer Science
, pp. 147-166
-
-
Lowe, G.1
-
15
-
-
0037917941
-
-
PalME-Team. PalME secure Palm-based Money Exchange - Project Homepage; (in German)
-
PalME-Team. PalME secure Palm-based Money Exchange - Project Homepage, 2001, URL:http://www4.in.tum.de/~palme/ (in German).
-
(2001)
-
-
-
16
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2): 85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
18
-
-
0038594096
-
Quest: Overview over the project
-
In D. Hutter. W. Stephan, P. Traverso, and M. Ullmann, editors; Springer LNCS 1641
-
O. Slotosch. Quest: Overview over the Project. In D. Hutter. W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998
-
(1998)
Applied Formal Methods - FM-Trends 98
, pp. 346-350
-
-
Slotosch, O.1
-
20
-
-
0020160380
-
On the inevitable interleaving of specification and implementation
-
W. Swartout and R. Balzer. On the Inevitable Interleaving of Specification and Implementation. Communications of the ACM, 25(7), 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.7
-
-
Swartout, W.1
Balzer, R.2
-
21
-
-
0038255533
-
Security engineering nach den common criteria - Eine fallstudie
-
Master's thesis, Technische Universität Müchen, Aug.
-
M. Vetterling. Security Engineering nach den Common Criteria - eine Fallstudie. Master's thesis, Technische Universität Müchen, Aug. 2001
-
(2001)
-
-
Vetterling, M.1
-
22
-
-
1642503732
-
Specification based test sequence generation with propositional logic
-
G. Wimmel, H. Lötzbeyer, A. Pretschner, and O. Slotosch. Specification Based Test Sequence Generation with Propositional Logic. Journal on Software Testing Verification and Reliability, 10, 2000
-
(2000)
Journal on Software Testing Verification and Reliability
, vol.10
-
-
Wimmel, G.1
Lötzbeyer, H.2
Pretschner, A.3
Slotosch, O.4
|