共 50 条
- [1] Security Software Formal Modeling and Verification Method Based on UML and Z [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
- [3] UML-Based modeling and formal verification for software self-adaptation [J]. Ruan Jian Xue Bao/Journal of Software, 2015, 26 (04): : 730 - 746
- [4] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3 [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859
- [5] Software formal modeling and verification method based on time STM [J]. Ruan Jian Xue Bao, 2 (223-238):
- [6] Formal verification method for cryptographic software security based on Hoare logic [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
- [7] Design of Software Security Verification with Formal Method Tools [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 163 - 167
- [8] Verification method of security model based on UML and model checking [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
- [9] An Extended UML Method for the Verification of Security Protocols [J]. 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
- [10] UML based Security Function Policy Verification Method for Requirements Specification [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833