-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
Jan
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
2
-
-
31744445215
-
Adding trace matching with free variables to Aspect J
-
ACM
-
C. Allan, P. Avgustinov, A. S. Christensen, L. Hendren, S. Kuzins, O. Lhoták, O. de Moor, D. Sereni, G. Sittampalam, and J. Tibbie. Adding trace matching with free variables to Aspect J. In OOPSLA, pages 345-364. ACM, 2005.
-
(2005)
OOPSLA
, pp. 345-364
-
-
Allan, C.1
Avgustinov, P.2
Christensen, A.S.3
Hendren, L.4
Kuzins, S.5
Lhoták, O.6
de Moor, O.7
Sereni, D.8
Sittampalam, G.9
Tibbie, J.10
-
3
-
-
34547286095
-
Defining liveness
-
Technical report, Ithaca, NY, USA
-
B. Alpern and F. B. Schneider. Defining liveness. Technical report, Ithaca, NY, USA, 1984.
-
(1984)
-
-
Alpern, B.1
Schneider, F.B.2
-
5
-
-
85016422463
-
Monitoring of real-time properties
-
FSTTCS, of, Springer-Verlag, Dec
-
A. Bauer, M. Leucker, and C. Schallhart. Monitoring of real-time properties. In FSTTCS, volume 4337 of LNCS. Springer-Verlag, Dec. 2006.
-
(2006)
LNCS
, vol.4337
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
6
-
-
56749083145
-
Runtime verification for LTL and TLTL
-
Technical Report TUM-I0724, Institut für Informatik, Technische Universität München, Dec
-
A. Bauer, M. Leucker, and C. Schallhart. Runtime verification for LTL and TLTL. Technical Report TUM-I0724, Institut für Informatik, Technische Universität München, Dec. 2007.
-
(2007)
-
-
Bauer, A.1
Leucker, M.2
Schallhart, C.3
-
7
-
-
57049135581
-
-
Academic Press
-
A. Biere, A. Cimatti, E. Clarke, O. Strichman, and Y. Zhu. Advances in Computers, chapter Bounded model checking. Academic Press, 2003.
-
(2003)
Advances in Computers, chapter Bounded model checking
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Strichman, O.4
Zhu, Y.5
-
10
-
-
35248878834
-
-
C. Eisner, D. Fisman, J. Havlicek, Y. Lustig, A. McIsaac, and D. V. Campenhout. Reasoning with temporal logic on truncated paths. In W. A. H. Jr. and F. Somenzi, editors, CAV, 2725 of LNCS, pages 27-39. Springer-Verlag, 2003.
-
C. Eisner, D. Fisman, J. Havlicek, Y. Lustig, A. McIsaac, and D. V. Campenhout. Reasoning with temporal logic on truncated paths. In W. A. H. Jr. and F. Somenzi, editors, CAV, volume 2725 of LNCS, pages 27-39. Springer-Verlag, 2003.
-
-
-
-
11
-
-
84894622420
-
-
K. Etessami. Stutter-invariant languages, omega-automata, and temporal logic. In CAV, 1633 of LNCS, pages 236-248. Springer-Verlag, 1999.
-
K. Etessami. Stutter-invariant languages, omega-automata, and temporal logic. In CAV, volume 1633 of LNCS, pages 236-248. Springer-Verlag, 1999.
-
-
-
-
13
-
-
11344253696
-
On the construction of monitors for temporal logic properties
-
M. Geilen. On the construction of monitors for temporal logic properties. ENTCS, 55(2), 2001.
-
(2001)
ENTCS
, vol.55
, Issue.2
-
-
Geilen, M.1
-
14
-
-
0002147440
-
Simple on-the-fly automatic verification of linear temporal logic
-
Chapman & Hall
-
R. Gerth, D. Peled, M. Y. Vardi, and P. Wolper. Simple on-the-fly automatic verification of linear temporal logic. In Proc. 15th IFIP WG6.1 Intl. Symp. Protocol Specification, Testing and Verification, pages 3-18. Chapman & Hall, 1996.
-
(1996)
Proc. 15th IFIP WG6.1 Intl. Symp. Protocol Specification, Testing and Verification
, pp. 3-18
-
-
Gerth, R.1
Peled, D.2
Vardi, M.Y.3
Wolper, P.4
-
17
-
-
33244457785
-
Sound methods and effective tools for model-based security engineering with UML
-
J. Jürjens. Sound methods and effective tools for model-based security engineering with UML. In ICSE, 2005.
-
(2005)
ICSE
-
-
Jürjens, J.1
-
18
-
-
57049136634
-
Model-based run-time checking of security permissions using guarded objects
-
Run-time Verification
-
J. Jürjens. Model-based run-time checking of security permissions using guarded objects. In Run-time Verification, Lecture Notes in Computer Science, 2008.
-
(2008)
Lecture Notes in Computer Science
-
-
Jürjens, J.1
-
19
-
-
33745725093
-
-
K. Krukow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems with applications to history-based access control. In CCS, pages 260-269. ACM, 2005.
-
K. Krukow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems with applications to history-based access control. In CCS, pages 260-269. ACM, 2005.
-
-
-
-
20
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
L. Lamport. Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering, 3(2): 125-143, 1977.
-
(1977)
IEEE Transactions on Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
21
-
-
85047040703
-
The temporal logic of programs
-
IEEE
-
A. Pnueli. The temporal logic of programs. In FOCS, pages 46-57. IEEE, 1977.
-
(1977)
FOCS
, pp. 46-57
-
-
Pnueli, A.1
-
22
-
-
33749421226
-
-
A. Pnueli and A. Zaks. PSL model checking and run-time verification via testers. In FM, 4085 of LNCS, pages 573-586. Springer, 2006.
-
A. Pnueli and A. Zaks. PSL model checking and run-time verification via testers. In FM, volume 4085 of LNCS, pages 573-586. Springer, 2006.
-
-
-
-
23
-
-
33748543201
-
Distributed usage control
-
A. Pretschner, M. Hilty, and D. A. Basin. Distributed usage control. Commun. ACM, 49(9):39-44, 2006.
-
(2006)
Commun. ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.A.3
-
24
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
25
-
-
33750050331
-
-
Wiley
-
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. Wiley, 2006.
-
(2006)
Security Patterns: Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez-Buglioni, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
26
-
-
0002836659
-
-
A. P. Sistla. Safety, liveness and fairness in temporal logic. Formal Asp. Comput., 6(5):495-512, 1994.
-
A. P. Sistla. Safety, liveness and fairness in temporal logic. Formal Asp. Comput., 6(5):495-512, 1994.
-
-
-
-
27
-
-
35248860217
-
-
G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Towards security monitoring patterns. In SAC, pages 1518-1525. ACM, 2007.
-
G. Spanoudakis, C. Kloukinas, and K. Androutsopoulos. Towards security monitoring patterns. In SAC, pages 1518-1525. ACM, 2007.
-
-
-
-
28
-
-
57049170141
-
-
Umlsec tool, 2001-08. http://computing-research.open.ac.uk/jj/umlsectool.
-
Umlsec tool, 2001-08. http://computing-research.open.ac.uk/jj/umlsectool.
-
-
-
|