-
1
-
-
27144479376
-
Formal methods diffusion: Past lessons and future prospects
-
F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security (SAFECOMP 2000), Rotterdam, The Netherlands, Oct.
-
R. Bloomfield, D. Craigen, F. Koob, M. Ullmann, and S.Wittmann. Formal methods diffusion: Past lessons and future prospects. In F. Koornneef and M. van der Meulen, editors, Computer Safety, Reliability and Security (SAFECOMP 2000), volume 1943 of LNCS, pages 211-226, Rotterdam, The Netherlands, Oct. 2000.
-
(2000)
LNCS
, vol.1943
, pp. 211-226
-
-
Bloomfield, R.1
Craigen, D.2
Koob, F.3
Ullmann, M.4
Wittmann, S.5
-
2
-
-
45849114537
-
Using aspects to design a secure system
-
IEEE Computer Society
-
G. Georg, I. Ray, and R. B. France. Using aspects to design a secure system. In ICECCS, pages 117-. IEEE Computer Society, 2002.
-
(2002)
ICECCS
, pp. 117
-
-
Georg, G.1
Ray, I.2
France, R.B.3
-
3
-
-
4444362674
-
Modeling complex systems by separating application and security concerns
-
[5]
-
H. Gomaa and M. E. Shin. Modeling complex systems by separating application and security concerns. In ICECCS [5], pages 19-28.
-
ICECCS
, pp. 19-28
-
-
Gomaa, H.1
Shin, M.E.2
-
7
-
-
33244457785
-
Sound methods and effective tools for modelbased security engineering with UML
-
IEEE Computer Society
-
J. Jiirjens. Sound methods and effective tools for modelbased security engineering with UML. In 27th International Conference on Software Engineering (ICSE 2005). IEEE Computer Society, 2005.
-
(2005)
27th International Conference on Software Engineering (ICSE 2005)
-
-
Jiirjens, J.1
-
8
-
-
33144472884
-
Modeling role-based access control using parameterized UML models
-
M. Wermelinger and T. Margaria, editors, FASE. Springer
-
D.-K. Kim, I. Ray, R. B. France, and N. Li. Modeling role-based access control using parameterized UML models. In M. Wermelinger and T. Margaria, editors, FASE, volume 2984 of LNCS, pages 180-193. Springer, 2004.
-
(2004)
LNCS
, vol.2984
, pp. 180-193
-
-
Kim, D.-K.1
Ray, I.2
France, R.B.3
Li, N.4
-
9
-
-
35048852597
-
Correct oo systems in computational logic
-
M. Bruynooghe, editor, LOPSTR, Springer
-
K.-K. Lau and M. Ornaghi. Correct oo systems in computational logic. In M. Bruynooghe, editor, LOPSTR, volume 3018 of LNCS, pages 34-53. Springer, 2003.
-
(2003)
LNCS
, vol.3018
, pp. 34-53
-
-
Lau, K.-K.1
Ornaghi, M.2
-
10
-
-
4444358787
-
Dealing with complex networks of process interactions: A security measure
-
[5]
-
P. Periorellis, O. C. Idowu, S. J. Lynden, M. P. Young, and P. András. Dealing with complex networks of process interactions: A security measure. In ICECCS [5], pages 29-36.
-
ICECCS
, pp. 29-36
-
-
Periorellis, P.1
Idowu, O.C.2
Lynden, S.J.3
Young, M.P.4
András, P.5
-
11
-
-
27144472652
-
Major threat: From formal methods without tools to tools without formal methods
-
[5]
-
B. Steffen. Major threat: From formal methods without tools to tools without formal methods. In ICECCS [5], page 15.
-
ICECCS
, pp. 15
-
-
Steffen, B.1
|