Security software formal modeling and verification method based on UML and Z

被引:0
|
作者
机构
[1] Cao, Kunyu
[2] Li, Xiaohong
[3] Xing, Jinliang
来源
Cao, K. (kunyucao@tju.edu.cn) | 1600年 / Springer Verlag卷 / 332期
关键词
D O I
10.1007/978-3-642-34447-3_35
中图分类号
学科分类号
摘要
15
引用
收藏
相关论文
共 50 条
  • [1] Security Software Formal Modeling and Verification Method Based on UML and Z
    Cao, Kunyu
    Li, Xiaohong
    Xing, Jinliang
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 390 - 401
  • [2] A security modeling and verification method of embedded software based on Z and MARTE
    Hu, Xinwen
    Zhuang, Yi
    Zhang, Fuyuan
    [J]. COMPUTERS & SECURITY, 2020, 88
  • [3] UML-Based modeling and formal verification for software self-adaptation
    Han, De-Shuai
    Yang, Qi-Liang
    Xing, Jian-Chun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2015, 26 (04): : 730 - 746
  • [4] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3
    Fang, Kunding
    Li, Xiaohong
    Hao, Jianye
    Feng, Zhiyong
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859
  • [5] Software formal modeling and verification method based on time STM
    School of Software Technology, Dalian University of Technology, Dalian
    116623, China
    [J]. Ruan Jian Xue Bao, 2 (223-238):
  • [6] Formal verification method for cryptographic software security based on Hoare logic
    Xiao K.
    [J]. Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition), 2019, 49 (04): : 1301 - 1306
  • [7] Design of Software Security Verification with Formal Method Tools
    Jang, Seung-Ju
    Ryoo, Jungwoo
    Lee, ChangYeol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 163 - 167
  • [8] Verification method of security model based on UML and model checking
    Cheng, Liang
    Zhang, Yang
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 699 - 708
  • [9] An Extended UML Method for the Verification of Security Protocols
    Shen, Gang
    Li, Xiaohong
    Feng, Ruitao
    Xu, Guangquan
    Hu, Jing
    Feng, Zhiyong
    [J]. 2014 19TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2014), 2014, : 19 - 28
  • [10] UML based Security Function Policy Verification Method for Requirements Specification
    Noro, Atsushi
    Matsuura, Saeko
    [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2013, : 832 - 833