메뉴 건너뛰기




Volumn , Issue , 2001, Pages 71-80

Specification modeling and validation applied to a family of network security products

Author keywords

[No Author keywords available]

Indexed keywords

GATEWAYS (COMPUTER NETWORKS); SPECIFICATIONS;

EID: 33244490092     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASE.2001.989792     Document Type: Conference Paper
Times cited : (2)

References (12)
  • 6
    • 0011793707 scopus 로고
    • Automatic extraction of executable program subsets by simultaneous dynamic program slicing
    • Kluwer Academic Publishers
    • R.J. Hall; Automatic extraction of executable program subsets by simultaneous dynamic program slicing; Automated Software Engineering 2(1), 33-53, Kluwer Academic Publishers, 1995.
    • (1995) Automated Software Engineering , vol.2 , Issue.1 , pp. 33-53
    • Hall, R.J.1
  • 7
    • 0034514169 scopus 로고    scopus 로고
    • Specification, validation, and synthesis of email agent controllers: A case study in function rich reactive system design
    • R.J. Hall; Specification, validation, and synthesis of email agent controllers: a case study in function rich reactive system design; in Proc. Third ACM Workshop on Formal Methods in Software Practice (FMSP'OO), ACM 2000.
    • (2000) Proc. Third ACM Workshop on Formal Methods in Software Practice (FMSP'OO)
    • Hall, R.J.1
  • 9
    • 4544221419 scopus 로고    scopus 로고
    • Completeness and consistency analysis of state-based requirements
    • M. Heimdahl & N. Leveson; Completeness and consistency analysis of state-based requirements; IEEE Transactions on Software Engineering, 22(6), 363-377, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.6 , pp. 363-377
    • Heimdahl, M.1    Leveson, N.2
  • 10
    • 84955606787 scopus 로고    scopus 로고
    • Applying 'practical' formal methods to the specification and analysis of security properties
    • LNCS Springer-Verlag
    • C. Heitmeyer; Applying 'practical' formal methods to the specification and analysis of security properties, in Proc. Info. Assurance in Computer Networks (MMM-ACNS 2001), LNCS 2052, Springer-Verlag, 2001.
    • (2001) Proc. Info. Assurance in Computer Networks (MMM-ACNS 2001) , vol.2052
    • Heitmeyer, C.1
  • 11
    • 0026880608 scopus 로고
    • Seven layers of knowledge representation and reasoning in support of software development
    • June
    • C. Rich & Y. Feldman; Seven layers of knowledge representation and reasoning in support of software development; IEEE Trans. on Software Eng. 18(6), 451-469, June 1992.
    • (1992) IEEE Trans. On Software Eng. , vol.18 , Issue.6 , pp. 451-469
    • Rich, C.1    Feldman, Y.2
  • 12
    • 85116879215 scopus 로고    scopus 로고
    • quoting Project Honeynet, June Counterpane Systems, Inc, 2001
    • B. Schneier (quoting Project Honeynet), Crypto-gram email newsletter, June 2001. Counterpane Systems, Inc, 2001. http://www.counterpane.com/crypto-gram0106.html
    • (2001) Crypto-Gram Email Newsletter
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.