-
1
-
-
24644452014
-
Object connectivity and full abstraction for a concurrent calculus of classes
-
[ABdBS04]
-
[ABdBS04] E. Ábráham, M.M. Bonsangue, F.S. de Boer, and M. Steffen. Object connectivity and full abstraction for a concurrent calculus of classes. In ICTAC 2004, pages 37-51, 2004.
-
(2004)
ICTAC 2004
, pp. 37-51
-
-
Ábráham, E.1
Bonsangue, M.M.2
De Boer, F.S.3
Steffen, M.4
-
2
-
-
84941158422
-
-
[Abs04] AbsInt. aicall
-
[Abs04] AbsInt. aicall. http://www.aicall.de/, 2004.
-
(2004)
-
-
-
3
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
[AJ01] N. Kobayashi and B. C. Pierce, editors, Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001). Springer
-
[AJ01] M. Abadi and J. Jürjens. Formal eavesdropping and its computational interpretation. In N. Kobayashi and B. C. Pierce, editors, Theoretical Aspects of Computer Software (4th International Symposium, TACS 2001), volume 2215 of LNCS, pages 82-94. Springer, 2001.
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
6
-
-
33646072801
-
A fully abstract semantics for UML components
-
[dBBSA04]
-
[dBBSA04] F.S. de Boer, M.M. Bonsangue, M. Steffen, and E. Ábráham. A fully abstract semantics for UML components. In FMCO 2004, pages 49-69, 2004.
-
(2004)
FMCO 2004
, pp. 49-69
-
-
De Boer, F.S.1
Bonsangue, M.M.2
Steffen, M.3
Ábráham, E.4
-
7
-
-
79956148893
-
Control flow versus logic: A denotational and a declarative model for guarded Horn clauses
-
[dBKPR89]
-
[dBKPR89] F.S. de Boer, J.N. Koek, C. Palamidessi, and J.J.M.M. Rutten. Control flow versus logic: a denotational and a declarative model for guarded Horn clauses. In MFCS 1989, pages 165-176, 1989.
-
(1989)
MFCS 1989
, pp. 165-176
-
-
De Boer, F.S.1
Koek, J.N.2
Palamidessi, C.3
Rutten, J.J.M.M.4
-
8
-
-
84937546528
-
Abstracting C with abC
-
[DHH02]
-
[DHH02] D. Dams, W. Hesse, and G.J. Holzmann. Abstracting C with abC. In CAV 2002, pages 515-520, 2002.
-
(2002)
CAV 2002
, pp. 515-520
-
-
Dams, D.1
Hesse, W.2
Holzmann, G.J.3
-
9
-
-
0020720357
-
On the security of public key protocols
-
[DY83]
-
[DY83] D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29 (2): 198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
0032476337
-
The UML as a formal modeling notation
-
[FELR98]
-
[FELR98] R. B. France, A. Evans, K. Lano, and B. Rumpe. The UML as a formal modeling notation. Computer Standards & Interfaces, 19:325-334, 1998.
-
(1998)
Computer Standards & Interfaces
, vol.19
, pp. 325-334
-
-
France, R.B.1
Evans, A.2
Lano, K.3
Rumpe, B.4
-
11
-
-
5744230994
-
Aspect-oriented approach to early design modelling
-
[FRGG04]
-
[FRGG04] R.B. France, I. Ray, G. Georg, and S. Ghosh. Aspect-oriented approach to early design modelling. IEE Proceedings - Software, 151(4):173-186, 2004.
-
(2004)
IEE Proceedings - Software
, vol.151
, Issue.4
, pp. 173-186
-
-
France, R.B.1
Ray, I.2
Georg, G.3
Ghosh, S.4
-
12
-
-
33646800880
-
29 new unclarities in the semantics of UML 2.0 state machines
-
[FSKdR05]
-
[FSKdR05] H. Fecher, J. Schönborn, M. Kyas, and W.P. de Roever. 29 new unclarities in the semantics of UML 2.0 state machines. In ICFEM 2005, pages 52-65, 2005.
-
(2005)
ICFEM 2005
, pp. 52-65
-
-
Fecher, H.1
Schönborn, J.2
Kyas, M.3
De Roever, W.P.4
-
13
-
-
33947285148
-
Abstract state machines
-
[Gur00] T. Rus, editor, 8th International Conference on Algebraic Methodology and Software Technology (AMAST 2000). Springer
-
[Gur00] Y. Gurevich. Abstract state machines. In T. Rus, editor, 8th International Conference on Algebraic Methodology and Software Technology (AMAST 2000), volume 1816 of LNCS. Springer, 2000.
-
(2000)
LNCS
, vol.1816
-
-
Gurevich, Y.1
-
15
-
-
0242339578
-
STAIRS - Steps to analyze interactions with refinement semantics
-
[HS03]. P. Stevens, editor, The Unified Modeling Language (UML 2003). Springer. 6th International Conference
-
[HS03] Ø. Haugen and K. Stølen. STAIRS - steps to analyze interactions with refinement semantics. In P. Stevens, editor, The Unified Modeling Language (UML 2003), volume 2863 of LNCS, pages 388-402. Springer, 2003. 6th International Conference.
-
(2003)
LNCS
, vol.2863
, pp. 388-402
-
-
Haugen, Ø.1
Stølen, K.2
-
17
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
[Jür01] H. Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE). Springer
-
[Jür01] J. Jürjens. Towards development of secure systems using UMLsec. In H. Hußmann, editor, 4th International Conference on Fundamental Approaches to Software Engineering (FASE), volume 2029 of LNCS, pages 187-200. Springer, 2001.
-
(2001)
LNCS
, vol.2029
, pp. 187-200
-
-
Jürjens, J.1
-
18
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
[Jür02] J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, 5th International Conference on the Unified Modeling Language (UML 2002). Springer
-
[Jür02] J. Jürjens. UMLsec: Extending UML for secure systems development. In J.-M. Jézéquel, H. Hußmann, and S. Cook, editors, 5th International Conference on the Unified Modeling Language (UML 2002), volume 2460 of LNCS, pages 412-425. Springer, 2002.
-
(2002)
LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
20
-
-
33846318194
-
Code security analysis of a biometric authentication system using automated theorem provers
-
[Jür05a]. IEEE
-
[Jür05a] J. Jürjens. Code security analysis of a biometric authentication system using automated theorem provers. In 21st Annual Computer Security 'Applications Conference (ACSAC 2005). IEEE, 2005.
-
(2005)
21st Annual Computer Security 'Applications Conference (ACSAC 2005)
-
-
Jürjens, J.1
-
22
-
-
34547455692
-
Security analysis of crypto-based Java programs using automated theorem provers
-
[Jür06] S. Easterbrook and S. Uchitel, editors. ACM
-
[Jür06] J. Jürjens. Security analysis of crypto-based Java programs using automated theorem provers. In S. Easterbrook and S. Uchitel, editors, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006). ACM, 2006.
-
(2006)
21st IEEE/ACM International Conference on Automated Software Engineering (ASE 2006)
-
-
Jürjens, J.1
-
23
-
-
33749634914
-
Validation of UML models via a mapping to communicating extended timed automata
-
[OGO04]
-
[OGO04] lu. Ober, S. Graf, and II. Ober. Validation of UML models via a mapping to communicating extended timed automata. In SPIN 2004, pages 127-145, 2004.
-
(2004)
SPIN 2004
, pp. 127-145
-
-
Ober, Lu.1
Graf, S.2
Ober, Il.3
-
24
-
-
84941153056
-
OMG UML specification v. 1.5
-
[UML03] UML Revision Task Force. March
-
[UML03] UML Revision Task Force. OMG UML Specification v. 1.5. OMG Document formal/03-03-01. Available at http://www.omg.org/uml, March 2003.
-
(2003)
OMG Document Formal/03-03-01
-
-
-
25
-
-
33749416173
-
-
[UML04] UMLsec group
-
[UML04] UMLsec group. Security analysis tool, 2004. http://www.umlsec. org.
-
(2004)
Security Analysis Tool
-
-
|