-
2
-
-
0007010376
-
-
Technical Report TUM-I9202, Technische Univerität München
-
Broy, M., Dederich, F., Dendorfer, C., Fuchs, M., Gritzner, T., and Weber, R. (1992). The Design of Distributed Systems-An Introduction to FOCUS. Technical Report TUM-I9202, Technische Univerität München.
-
(1992)
The Design of Distributed Systems-An Introduction to FOCUS
-
-
Broy, M.1
Dederich, F.2
Dendorfer, C.3
Fuchs, M.4
Gritzner, T.5
Weber, R.6
-
3
-
-
84957667419
-
Enriching the Software Development Process by Formal Methods
-
Broy, M. and Slotosch, O. (1999). Enriching the Software Development Process by Formal Methods. In Current Trends in Applied Formal Methods 1998, pages 44-61.
-
(1999)
In Current Trends In Applied Formal Methods
, vol.1998
, pp. 44-61
-
-
Broy, M.1
Slotosch, O.2
-
4
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R. (1989). A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
20444495150
-
-
Common Criteria, Technical report, Communications Security Establishment (Canada), Service Central de la Sécurité des Systèmes d'Information (France), Bundesamt für Sicherheit in der Informationstech-nik (Germany), Netherlands National Communications Security Agency, Communications-Electronics Security Group (United Kingdom), National Institute of Standards and Technology (United States), National Security Agency (United States)
-
Common Criteria (1999). Common criteria for information technology security evaluation version 2.1. Technical report, Communications Security Establishment (Canada), Service Central de la Sécurité des Systèmes d'Information (France), Bundesamt für Sicherheit in der Informationstech-nik (Germany), Netherlands National Communications Security Agency, Communications-Electronics Security Group (United Kingdom), National Institute of Standards and Technology (United States), National Security Agency (United States).
-
(1999)
Common Criteria For Information Technology Security Evaluation Version 2.1
-
-
-
10
-
-
0003422822
-
Tool supported Specification and Simulation of Distributed Systems
-
Huber, F., Molterer, S., Rausch, A., Schätz, B., Sihling, M., and Slotosch, O. (1998a). Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155-164.
-
(1998)
In International Symposium On Software Engineering For Parallel and Distributed Systems
, pp. 155-164
-
-
Huber, F.1
Molterer, S.2
Rausch, A.3
Schätz, B.4
Sihling, M.5
Slotosch, O.6
-
11
-
-
77950064308
-
Traffic Lights-An AutoFocus Case Study
-
IEEE Computer Society
-
Huber, F., Molterer, S., Schätz, B., Slotosch, O., and Vilbig, A. (1998b). Traffic Lights-An AutoFocus Case Study. In 1998 International Conference on Application of Concurrency to System Design, pages 282-294. IEEE Computer Society.
-
(1998)
In 1998 International Conference On Application of Concurrency to System Design
, pp. 282-294
-
-
Huber, F.1
Molterer, S.2
Schätz, B.3
Slotosch, O.4
Vilbig, A.5
-
13
-
-
15944409094
-
-
ITU, 120: Message Sequence Chart (MSC). ITU-TS, Geneva
-
ITU (1996). ITU-TS Recommendation Z. 120: Message Sequence Chart (MSC). ITU-TS, Geneva.
-
(1996)
ITU-TS Recommendation Z
-
-
-
16
-
-
19144362557
-
Formally Defining Security Properties with Relations on Streams
-
Schneider, S. and Ryan, P., editors, Elsevier Science Publishers
-
Lotz, V. (2000). Formally Defining Security Properties with Relations on Streams. In Schneider, S. and Ryan, P., editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers.
-
(2000)
Electronic Notes In Theoretical Computer Science
, vol.32
-
-
Lotz, V.1
-
17
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR
-
Margaria and Steffen, editors, of lncs, sv
-
Lowe, G. (1996). Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDR. In Margaria and Steffen, editors, TACAS, volume 1055 of lncs, pages 147-166. sv.
-
(1996)
TACAS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
18
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L. C. (1998). The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
0038594096
-
Quest: Overview over the Project
-
Hutter, D., Stephan, W., Traverso, P., and Ullmann, M., editors, Springer LNCS 1641
-
Slotosch, O. (1998). Quest: Overview over the Project. In Hutter, D., Stephan, W., Traverso, P., and Ullmann, M., editors, Applied Formal Methods-FM-Trends 98, pages 346-350. Springer LNCS 1641.
-
(1998)
Applied Formal Methods-FM-Trends
, vol.98
, pp. 346-350
-
-
Slotosch, O.1
-
23
-
-
1642503732
-
Specification Based Test Sequence Generation with Propositional Logic
-
Wimmel, G., Lötzbeyer, H., Pretschner, A., and Slotosch, O. (2000). Specification Based Test Sequence Generation with Propositional Logic. Journal on Software Testing Verification and Reliability, 10:229-248.
-
(2000)
Journal On Software Testing Verification and Reliability
, vol.10
, pp. 229-248
-
-
Wimmel, G.1
Lötzbeyer, H.2
Pretschner, A.3
Slotosch, O.4
|