메뉴 건너뛰기




Volumn 4468 LNCS, Issue , 2007, Pages 221-235

A refinement method for Java programs

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; ELECTRONIC COMMERCE; MOBILE PHONES; NETWORK PROTOCOLS; SPECIFICATIONS; THEOREM PROVING; CALCULATIONS; COMPUTER SOFTWARE; FORMAL METHODS; MOBILE COMMERCE; NETWORK SECURITY;

EID: 37149027632     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72952-5_14     Document Type: Conference Paper
Times cited : (7)

References (31)
  • 1
    • 55049132505 scopus 로고    scopus 로고
    • Formal system development with KIV
    • Maibaum, T, ed, ETAPS 2000 and FASE 2000, Springer, Heidelberg
    • Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) ETAPS 2000 and FASE 2000, LNCS, vol. 1783, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1783
    • Balser, M.1    Reif, W.2    Schellhorn, G.3    Stenzel, K.4    Thums, A.5
  • 5
    • 23044531945 scopus 로고    scopus 로고
    • Specifying and verifying a decimal representation in Java for smart cards
    • Kirchner, H, Ringeissen, C, eds, AMAST 2002, Springer, Heidelberg
    • Breunesse, C., Jacobs, B., van den Berg, J.: Specifying and verifying a decimal representation in Java for smart cards. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002, LNCS, vol. 2422, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2422
    • Breunesse, C.1    Jacobs, B.2    van den Berg, J.3
  • 6
    • 18944384605 scopus 로고    scopus 로고
    • An overview of jml tools and applications
    • Burdy, L, Arts, T, Fokkink, W, eds, FMICS '03, Eighth International Workshop on Formal Methods for Industrial Critical Systems, Elsevier, Amsterdam
    • Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G.T., Rustan, K., Leino, M., Poll, E.: An overview of jml tools and applications. In: Burdy, L., Arts, T., Fokkink, W. (eds.) (FMICS '03). Eighth International Workshop on Formal Methods for Industrial Critical Systems. Electronic Notes in Theoretical Computer Science, vol. 80, Elsevier, Amsterdam (2003)
    • (2003) Electronic Notes in Theoretical Computer Science , vol.80
    • Burdy, L.1    Cheon, Y.2    Cok, D.3    Ernst, M.4    Kiniry, J.5    Leavens, G.T.6    Rustan, K.7    Leino, M.8    Poll, E.9
  • 8
    • 0042419958 scopus 로고    scopus 로고
    • Data Refinement: Model-Oriented Proof Methods and their Comparison
    • Cambridge University Press, Cambridge
    • de Roever, W., Engelhardt, K.: Data Refinement: Model-Oriented Proof Methods and their Comparison. Cambridge Tracts in Theoretical Computer Science, vol. 47. Cambridge University Press, Cambridge (1998)
    • (1998) Cambridge Tracts in Theoretical Computer Science , vol.47
    • de Roever, W.1    Engelhardt, K.2
  • 9
    • 37149031229 scopus 로고    scopus 로고
    • Derrick, J., Boiten, E.: Refinement in Z and in Object-Z: Foundations and Advanced Applications. FACIT. Springer, Heidelberg (2001)
    • Derrick, J., Boiten, E.: Refinement in Z and in Object-Z: Foundations and Advanced Applications. FACIT. Springer, Heidelberg (2001)
  • 10
    • 33746654922 scopus 로고    scopus 로고
    • Developing Provably Secure M-Commerce Applications
    • Müller, G, ed, ETRICS 2006, Springer, Heidelberg
    • Grandy, H., Haneberg, D., Reif, W., Stenzel, K.: Developing Provably Secure M-Commerce Applications. In: Müller, G. (ed.) ETRICS 2006, LNCS, vol. 3995, pp. 115-129. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 115-129
    • Grandy, H.1    Haneberg, D.2    Reif, W.3    Stenzel, K.4
  • 11
    • 37149025029 scopus 로고    scopus 로고
    • Grandy, H., Moebius, N., Bischof, M., Haneberg, D., Schellhorn, G., Stenzel, K., Reif, W.: The Mondex Case Study: From Specifications to Code. Technical Report 2006-31, University of Augsburg, 2006. URL: http://www.informatik.imi-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
    • Grandy, H., Moebius, N., Bischof, M., Haneberg, D., Schellhorn, G., Stenzel, K., Reif, W.: The Mondex Case Study: From Specifications to Code. Technical Report 2006-31, University of Augsburg, 2006. URL: http://www.informatik.imi-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
  • 12
    • 37149000894 scopus 로고    scopus 로고
    • Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of Mondex Electronic Purses with KIV: From Transactions to a Security Protocol. Technical Report 2006-32, University of Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
    • Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of Mondex Electronic Purses with KIV: From Transactions to a Security Protocol. Technical Report 2006-32, University of Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
  • 13
    • 85034864446 scopus 로고
    • Data refinement refined
    • Robinet, B, Wilhelm, R, eds, Proc. ESOP, 213, pp, Springer, Heidelberg
    • Jifeng, H., Hoare, C.A.R., Sanders, J.W.: Data refinement refined. In: Robinet, B., Wilhelm, R. (eds.) Proc. ESOP 86, LNCS, vol. 213, pp. 187-196. Springer, Heidelberg (1986)
    • (1986) LNCS , vol.86 , pp. 187-196
    • Jifeng, H.1    Hoare, C.A.R.2    Sanders, J.W.3
  • 14
    • 24144433896 scopus 로고    scopus 로고
    • Implementing a Formally Verifiable Security Protocol in Java Card
    • Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
    • Hubbers, E., Oostdijk, M., Poll, E.: Implementing a Formally Verifiable Security Protocol in Java Card. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing, LNCS, vol. 2802, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2802
    • Hubbers, E.1    Oostdijk, M.2    Poll, E.3
  • 15
    • 33745221614 scopus 로고    scopus 로고
    • Huisman, M.: Verification of Java's abstractcollection class: a case study. In: Boiten, E.A., Möller, B. (eds.) MPC 2002, LNCS, 2386, Springer, Heidelberg (2002)
    • Huisman, M.: Verification of Java's abstractcollection class: a case study. In: Boiten, E.A., Möller, B. (eds.) MPC 2002, LNCS, vol. 2386, Springer, Heidelberg (2002)
  • 16
    • 21144449030 scopus 로고    scopus 로고
    • Formal verification of a commercial smart card applet with multiple tools
    • Rattray, C, Maharaj, S, Shankland, C, eds, AMAST 2004, Springer, Heidelberg
    • Jacobs, B., Marche, C., Rauch, N.: Formal verification of a commercial smart card applet with multiple tools. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004, LNCS, vol. 3116, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3116
    • Jacobs, B.1    Marche, C.2    Rauch, N.3
  • 17
    • 0003518498 scopus 로고    scopus 로고
    • Joy, B, Steele, G, Gosling, J, Bracha, G, eds, 2nd edn. Addison-Wesley, London
    • Joy, B., Steele, G., Gosling, J., Bracha, G. (eds.): The Java (tm) Language Specification, 2nd edn. Addison-Wesley, London (2000)
    • (2000) The Java (tm) Language Specification
  • 18
    • 37149027803 scopus 로고    scopus 로고
    • KIV homepage, http://www.informatik.uni-augsburg.de/swt/kiv.
    • KIV homepage, http://www.informatik.uni-augsburg.de/swt/kiv.
  • 21
    • 37149055945 scopus 로고    scopus 로고
    • MasterCard International Inc, URL
    • MasterCard International Inc. Mondex. URL: http://www.mondex.com.
    • Mondex
  • 23
    • 0031643297 scopus 로고    scopus 로고
    • The Inductive Approach to Verifying Cryptographic Protocols
    • Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security 6 (1998)
    • (1998) J. Computer Security , vol.6
    • Paulson, L.C.1
  • 24
    • 37149014449 scopus 로고    scopus 로고
    • Schellhorn, G., Grandy, H., Haneberg, D., Moebius, N., Reif, W.: A systematic verification Approach for Mondex Electronic Purses using ASMs. Technical Report 2006-27, Universität Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
    • Schellhorn, G., Grandy, H., Haneberg, D., Moebius, N., Reif, W.: A systematic verification Approach for Mondex Electronic Purses using ASMs. Technical Report 2006-27, Universität Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
  • 25
    • 33749384522 scopus 로고    scopus 로고
    • Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006, LNCS, 4085, pp. 16-31. Springer, Heidelberg (2006)
    • Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006, LNCS, vol. 4085, pp. 16-31. Springer, Heidelberg (2006)
  • 26
    • 35048819453 scopus 로고    scopus 로고
    • A formally verified calculus for full Java Card
    • Rattray, C, Maharaj, S, Shankland, C, eds, AMAST 2004, Springer, Heidelberg
    • Stenzel, K.: A formally verified calculus for full Java Card. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004, LNCS, vol. 3116, Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3116
    • Stenzel, K.1
  • 27
    • 37149040066 scopus 로고    scopus 로고
    • Stenzel, K.: Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, or http://www.informatik.uni-augsburg.de/forschung/dissertations/ (2005)
    • Stenzel, K.: Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, or http://www.informatik.uni-augsburg.de/forschung/dissertations/ (2005)
  • 31
    • 33750115438 scopus 로고    scopus 로고
    • First steps in the verified software grand challenge
    • Woodcock, J.: First steps in the verified software grand challenge. IEEE Computer 39(10), 57-64 (2006)
    • (2006) IEEE Computer , vol.39 , Issue.10 , pp. 57-64
    • Woodcock, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.