-
1
-
-
55049132505
-
Formal system development with KIV
-
Maibaum, T, ed, ETAPS 2000 and FASE 2000, Springer, Heidelberg
-
Balser, M., Reif, W., Schellhorn, G., Stenzel, K., Thums, A.: Formal system development with KIV. In: Maibaum, T. (ed.) ETAPS 2000 and FASE 2000, LNCS, vol. 1783, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1783
-
-
Balser, M.1
Reif, W.2
Schellhorn, G.3
Stenzel, K.4
Thums, A.5
-
3
-
-
0000754015
-
On the refinement and simulation of data types and processes
-
Araki, K, Galloway, A, Taguchi, K, eds, Springer, Heidelberg
-
Bolton, C., Davies, J., Woodcock, J.C.P.: On the refinement and simulation of data types and processes. In: Araki, K., Galloway, A., Taguchi, K. (eds.) Proceedings of the International conference of Integrated Formal Methods (IFM), pp. 273-292. Springer, Heidelberg (1999)
-
(1999)
Proceedings of the International conference of Integrated Formal Methods (IFM)
, pp. 273-292
-
-
Bolton, C.1
Davies, J.2
Woodcock, J.C.P.3
-
5
-
-
23044531945
-
Specifying and verifying a decimal representation in Java for smart cards
-
Kirchner, H, Ringeissen, C, eds, AMAST 2002, Springer, Heidelberg
-
Breunesse, C., Jacobs, B., van den Berg, J.: Specifying and verifying a decimal representation in Java for smart cards. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002, LNCS, vol. 2422, Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2422
-
-
Breunesse, C.1
Jacobs, B.2
van den Berg, J.3
-
6
-
-
18944384605
-
An overview of jml tools and applications
-
Burdy, L, Arts, T, Fokkink, W, eds, FMICS '03, Eighth International Workshop on Formal Methods for Industrial Critical Systems, Elsevier, Amsterdam
-
Burdy, L., Cheon, Y., Cok, D., Ernst, M., Kiniry, J., Leavens, G.T., Rustan, K., Leino, M., Poll, E.: An overview of jml tools and applications. In: Burdy, L., Arts, T., Fokkink, W. (eds.) (FMICS '03). Eighth International Workshop on Formal Methods for Industrial Critical Systems. Electronic Notes in Theoretical Computer Science, vol. 80, Elsevier, Amsterdam (2003)
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.80
-
-
Burdy, L.1
Cheon, Y.2
Cok, D.3
Ernst, M.4
Kiniry, J.5
Leavens, G.T.6
Rustan, K.7
Leino, M.8
Poll, E.9
-
7
-
-
0004215976
-
A Logic of Authentication. Technical report
-
Burrows, M., Abadi, M., Needham, R.M.: A Logic of Authentication. Technical report, SRC Research Report 39 (1989)
-
(1989)
SRC Research Report
, vol.39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
8
-
-
0042419958
-
Data Refinement: Model-Oriented Proof Methods and their Comparison
-
Cambridge University Press, Cambridge
-
de Roever, W., Engelhardt, K.: Data Refinement: Model-Oriented Proof Methods and their Comparison. Cambridge Tracts in Theoretical Computer Science, vol. 47. Cambridge University Press, Cambridge (1998)
-
(1998)
Cambridge Tracts in Theoretical Computer Science
, vol.47
-
-
de Roever, W.1
Engelhardt, K.2
-
9
-
-
37149031229
-
-
Derrick, J., Boiten, E.: Refinement in Z and in Object-Z: Foundations and Advanced Applications. FACIT. Springer, Heidelberg (2001)
-
Derrick, J., Boiten, E.: Refinement in Z and in Object-Z: Foundations and Advanced Applications. FACIT. Springer, Heidelberg (2001)
-
-
-
-
10
-
-
33746654922
-
Developing Provably Secure M-Commerce Applications
-
Müller, G, ed, ETRICS 2006, Springer, Heidelberg
-
Grandy, H., Haneberg, D., Reif, W., Stenzel, K.: Developing Provably Secure M-Commerce Applications. In: Müller, G. (ed.) ETRICS 2006, LNCS, vol. 3995, pp. 115-129. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 115-129
-
-
Grandy, H.1
Haneberg, D.2
Reif, W.3
Stenzel, K.4
-
11
-
-
37149025029
-
-
Grandy, H., Moebius, N., Bischof, M., Haneberg, D., Schellhorn, G., Stenzel, K., Reif, W.: The Mondex Case Study: From Specifications to Code. Technical Report 2006-31, University of Augsburg, 2006. URL: http://www.informatik.imi-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
Grandy, H., Moebius, N., Bischof, M., Haneberg, D., Schellhorn, G., Stenzel, K., Reif, W.: The Mondex Case Study: From Specifications to Code. Technical Report 2006-31, University of Augsburg, 2006. URL: http://www.informatik.imi-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
-
-
-
12
-
-
37149000894
-
-
Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of Mondex Electronic Purses with KIV: From Transactions to a Security Protocol. Technical Report 2006-32, University of Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
Haneberg, D., Schellhorn, G., Grandy, H., Reif, W.: Verification of Mondex Electronic Purses with KIV: From Transactions to a Security Protocol. Technical Report 2006-32, University of Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
-
-
-
13
-
-
85034864446
-
Data refinement refined
-
Robinet, B, Wilhelm, R, eds, Proc. ESOP, 213, pp, Springer, Heidelberg
-
Jifeng, H., Hoare, C.A.R., Sanders, J.W.: Data refinement refined. In: Robinet, B., Wilhelm, R. (eds.) Proc. ESOP 86, LNCS, vol. 213, pp. 187-196. Springer, Heidelberg (1986)
-
(1986)
LNCS
, vol.86
, pp. 187-196
-
-
Jifeng, H.1
Hoare, C.A.R.2
Sanders, J.W.3
-
14
-
-
24144433896
-
Implementing a Formally Verifiable Security Protocol in Java Card
-
Hutter, D, Müller, G, Stephan, W, Ullmann, M, eds, Security in Pervasive Computing, Springer, Heidelberg
-
Hubbers, E., Oostdijk, M., Poll, E.: Implementing a Formally Verifiable Security Protocol in Java Card. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing, LNCS, vol. 2802, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2802
-
-
Hubbers, E.1
Oostdijk, M.2
Poll, E.3
-
15
-
-
33745221614
-
-
Huisman, M.: Verification of Java's abstractcollection class: a case study. In: Boiten, E.A., Möller, B. (eds.) MPC 2002, LNCS, 2386, Springer, Heidelberg (2002)
-
Huisman, M.: Verification of Java's abstractcollection class: a case study. In: Boiten, E.A., Möller, B. (eds.) MPC 2002, LNCS, vol. 2386, Springer, Heidelberg (2002)
-
-
-
-
16
-
-
21144449030
-
Formal verification of a commercial smart card applet with multiple tools
-
Rattray, C, Maharaj, S, Shankland, C, eds, AMAST 2004, Springer, Heidelberg
-
Jacobs, B., Marche, C., Rauch, N.: Formal verification of a commercial smart card applet with multiple tools. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004, LNCS, vol. 3116, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3116
-
-
Jacobs, B.1
Marche, C.2
Rauch, N.3
-
17
-
-
0003518498
-
-
Joy, B, Steele, G, Gosling, J, Bracha, G, eds, 2nd edn. Addison-Wesley, London
-
Joy, B., Steele, G., Gosling, J., Bracha, G. (eds.): The Java (tm) Language Specification, 2nd edn. Addison-Wesley, London (2000)
-
(2000)
The Java (tm) Language Specification
-
-
-
18
-
-
37149027803
-
-
KIV homepage, http://www.informatik.uni-augsburg.de/swt/kiv.
-
KIV homepage, http://www.informatik.uni-augsburg.de/swt/kiv.
-
-
-
-
21
-
-
37149055945
-
-
MasterCard International Inc, URL
-
MasterCard International Inc. Mondex. URL: http://www.mondex.com.
-
Mondex
-
-
-
22
-
-
37149014779
-
Rigorous development of java card applications
-
Clarke, T, Evans, V, Lano, K, eds, London, UK
-
Mostowski, W.: Rigorous development of java card applications. In: Clarke, T., Evans, V., Lano, K. (eds), Proceedings, Fourth Workshop on Rigorous Object-Oriented Methods, London, UK (2002)
-
(2002)
Proceedings, Fourth Workshop on Rigorous Object-Oriented Methods
-
-
Mostowski, W.1
-
23
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security 6 (1998)
-
(1998)
J. Computer Security
, vol.6
-
-
Paulson, L.C.1
-
24
-
-
37149014449
-
-
Schellhorn, G., Grandy, H., Haneberg, D., Moebius, N., Reif, W.: A systematic verification Approach for Mondex Electronic Purses using ASMs. Technical Report 2006-27, Universität Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
Schellhorn, G., Grandy, H., Haneberg, D., Moebius, N., Reif, W.: A systematic verification Approach for Mondex Electronic Purses using ASMs. Technical Report 2006-27, Universität Augsburg, 2006. URL: http://www.informatik.uni-augsburg.de/lehrstuehle/swt/se/publications/ (2006)
-
-
-
-
25
-
-
33749384522
-
-
Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006, LNCS, 4085, pp. 16-31. Springer, Heidelberg (2006)
-
Schellhorn, G., Grandy, H., Haneberg, D., Reif, W.: The Mondex Challenge: Machine Checked Proofs for an Electronic Purse. In: Misra, J., Nipkow, T., Sekerinski, E. (eds.) FM 2006, LNCS, vol. 4085, pp. 16-31. Springer, Heidelberg (2006)
-
-
-
-
26
-
-
35048819453
-
A formally verified calculus for full Java Card
-
Rattray, C, Maharaj, S, Shankland, C, eds, AMAST 2004, Springer, Heidelberg
-
Stenzel, K.: A formally verified calculus for full Java Card. In: Rattray, C., Maharaj, S., Shankland, C. (eds.) AMAST 2004, LNCS, vol. 3116, Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3116
-
-
Stenzel, K.1
-
27
-
-
37149040066
-
-
Stenzel, K.: Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, or http://www.informatik.uni-augsburg.de/forschung/dissertations/ (2005)
-
Stenzel, K.: Verification of Java Card Programs. PhD thesis, Universität Augsburg, Fakultät für Angewandte Informatik, URL: http://www.opus-bayern.de/uni-augsburg/volltexte/2005/122/, or http://www.informatik.uni-augsburg.de/forschung/dissertations/ (2005)
-
-
-
-
28
-
-
0043024883
-
-
Technical monograph PRG-126, Oxford University Computing Laboratory, July
-
Stepney, S., Cooper, D., Woodcock, J.: AN ELECTRONIC PURSE Specification, Refinement, and Proof. Technical monograph PRG-126, Oxford University Computing Laboratory, July 2000. http://www-users.cs.york.ac.uk/~susan/bib/ss/z/monog.htm (2000)
-
(2000)
AN ELECTRONIC PURSE Specification, Refinement, and Proof
-
-
Stepney, S.1
Cooper, D.2
Woodcock, J.3
-
31
-
-
33750115438
-
First steps in the verified software grand challenge
-
Woodcock, J.: First steps in the verified software grand challenge. IEEE Computer 39(10), 57-64 (2006)
-
(2006)
IEEE Computer
, vol.39
, Issue.10
, pp. 57-64
-
-
Woodcock, J.1
|