-
1
-
-
18944374289
-
-
German
-
MEWADIS website at http://www4.in.tum.de/~mewadis. In German.
-
MEWADIS Website
-
-
-
3
-
-
78650448009
-
Key issues of a formally based process model for security engineering
-
R. Breu, K. Burger, M. Hafner, J. Jürjens, G. Popp, G. Wimmel, and V. Lotz. Key Issues of a Formally Based Process Model for Security Engineering. In Proceedings of the 16th International Conference on Software & Systems Engineering and their Applications (ICSSEA03), 2003.
-
(2003)
Proceedings of the 16th International Conference on Software & Systems Engineering and Their Applications (ICSSEA03)
-
-
Breu, R.1
Burger, K.2
Hafner, M.3
Jürjens, J.4
Popp, G.5
Wimmel, G.6
Lotz, V.7
-
4
-
-
34250199932
-
Modeling Services and layered architectures
-
H. König, M. Heiner, and A. Wolisz, editors, Formal Techniques for Networked and Distributed Systems, Springer-Verlag
-
M. Broy. Modeling Services and Layered Architectures. In H. König, M. Heiner, and A. Wolisz, editors, Formal Techniques for Networked and Distributed Systems, volume 2767 of Lecture Notes in Computer Science, pages 48-61. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2767
, pp. 48-61
-
-
Broy, M.1
-
7
-
-
18944368586
-
Towards a model-based and incremental development process for service-based systems
-
M. H. Hamaza, editor, Innsbruck, Austria, February, 17-19
-
M. Deubler, J. Grünbauer, G. Popp, G. Wimmel, and C. Salzmann. Towards a Model-Based and Incremental Development Process for Service-Based Systems. In M. H. Hamaza, editor, Proceedings of the IASTED International Conference on Software Engineering (IASTED SE 2004), pages 183-188, Innsbruck, Austria, February, 17-19 2004.
-
(2004)
Proceedings of the IASTED International Conference on Software Engineering (IASTED SE 2004)
, pp. 183-188
-
-
Deubler, M.1
Grünbauer, J.2
Popp, G.3
Wimmel, G.4
Salzmann, C.5
-
10
-
-
0001449325
-
Temporal and modal logic
-
J. van Leeuwen, editor, chapter 16, Elsevier Science Publishers
-
E. A. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B, chapter 16, pages 995-1072. Elsevier Science Publishers, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 995-1072
-
-
Emerson, E.A.1
-
11
-
-
18944394652
-
Modelling and verification of layered security protocols: A bank application
-
S. Anderson, M. Felici, and B. Little-wood, editors, The 22nd International Conference on Computer Safety, Reliability and Security (SAFECOMP 2003), Edinburgh, UK, September 23-26 Springer-Verlag
-
J. Grünbauer, H. Hollmann, J. Jürjens, and G. Wimmel. Modelling and Verification of Layered Security Protocols: A Bank Application. In S. Anderson, M. Felici, and B. Little-wood, editors, The 22nd International Conference on Computer Safety, Reliability and Security (SAFECOMP 2003), volume 2788 of lncs, pages 116-131, Edinburgh, UK, September 23-26 2003. Springer-Verlag.
-
(2003)
Lncs
, vol.2788
, pp. 116-131
-
-
Grünbauer, J.1
Hollmann, H.2
Jürjens, J.3
Wimmel, G.4
-
12
-
-
0003422822
-
Tool supported specification and simulation of distributed systems
-
F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Sofware Engineering for Parallel and Distributed Systems, pages 155-164, 1998.
-
(1998)
International Symposium on Sofware Engineering for Parallel and Distributed Systems
, pp. 155-164
-
-
Huber, F.1
Molterer, S.2
Rausch, A.3
Schätz, B.4
Sihling, M.5
Slotosch, O.6
-
14
-
-
0003504769
-
-
Addison Wesley Longman, Inc.
-
I. Jacobson, M. Christerson, P. Jonsson, and G. Övergaard. Object-Oriented Software Engineering: A Use-Case Driven Approach. Addison Wesley Longman, Inc., 1992.
-
(1992)
Object-oriented Software Engineering: A Use-Case Driven Approach
-
-
Jacobson, I.1
Christerson, M.2
Jonsson, P.3
Övergaard, G.4
-
17
-
-
27944496204
-
-
OMG. MDA Specifications. Available at http://www.omg.org/mda/specs.htm.
-
MDA Specifications
-
-
-
24
-
-
0038594096
-
Quest: Overview over the project
-
D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Springer LNCS 1641
-
O. Slotosch. Quest: Overview over the Project. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.
-
(1998)
Applied Formal Methods - FM-Trends 98
, pp. 346-350
-
-
Slotosch, O.1
-
26
-
-
84948967933
-
Specification-based test generation for security-critical systems using mutations
-
International Conference on Formal Engineering Methods (ICFEM), Shanghai, China, Oct. 22-25 Springer Verlag
-
G. Wimmel and J. Jürjens. Specification-based Test Generation for Security-Critical Systems Using Mutations. In International Conference on Formal Engineering Methods (ICFEM), volume 2495 of Lecture Notes in Computer Science, pages 471-482, Shanghai, China, Oct. 22-25 2002. Springer Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2495
, pp. 471-482
-
-
Wimmel, G.1
Jürjens, J.2
-
27
-
-
0006864407
-
Formal description of telecommunication services in promela and z
-
M. Broy and R. Steinbrüggen, editors, Proceedings of the Nineteenth International NATO Summer School, IOS Press
-
P. Zave. Formal description of telecommunication services in promela and z. In M. Broy and R. Steinbrüggen, editors, Calculational System Design, Proceedings of the Nineteenth International NATO Summer School, pages 395-420. IOS Press, 1999.
-
(1999)
Calculational System Design
, pp. 395-420
-
-
Zave, P.1
-
28
-
-
2942750821
-
-
Programming Methodology. Springer-Verlag
-
P. Zave. An Experiment in Feature Engineering, pages 353-377. Programming Methodology. Springer-Verlag, 2003.
-
(2003)
An Experiment in Feature Engineering
, pp. 353-377
-
-
Zave, P.1
|