|
Volumn 2000-January, Issue , 2000, Pages 115-124
|
Application of the B formal method to the proof of a type verification algorithm
|
Author keywords
Data security; Information security; Information systems; Java; Microprocessors; Power system security; Read only memory; Runtime; Smart cards; Testing
|
Indexed keywords
ALGORITHMS;
CODES (SYMBOLS);
FORMAL METHODS;
INFORMATION SYSTEMS;
MICROPROCESSOR CHIPS;
ROM;
SECURITY OF DATA;
SMART CARDS;
SYSTEMS ENGINEERING;
TESTING;
TRANSPORTATION;
CARD SECURITIES;
CODE VERIFICATION;
CRYPTOGRAPHIC CERTIFICATES;
JAVA;
POWER SYSTEM SECURITY;
RUNTIMES;
VERIFICATION ALGORITHMS;
VERIFICATION PROCESS;
FORMAL VERIFICATION;
|
EID: 33644486712
PISSN: 15302059
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/HASE.2000.895449 Document Type: Conference Paper |
Times cited : (5)
|
References (12)
|