共 50 条
- [41] Specification and Deployment of Integrated Security Policies for Outsourced Data [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 17 - 32
- [42] Applying practical formal methods to the specification and analysis of security properties [J]. INFORMATION ASSURANCE IN COMPUTER NETWORKS: METHODS, MODELS AND ARCHITECTURES FOR NETWORK SECURITY, PROCEEDINGS, 2001, 2052 : 84 - 89
- [44] Formal specification and verification of resource bound security using PVS [J]. SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2004, 3233 : 113 - 133
- [45] Towards a formal specification method for enterprise information system security [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 373 - +
- [47] Security Protocol For Distributed Networks using Formal Method Specification [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
- [48] Security requirements specification by formal methods: a research metadata analysis [J]. Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
- [49] First Results of a Formal Analysis of the Network Time Security Specification [J]. SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 218 - 245
- [50] A Formal Security Framework for Mobile Agent Systems: Specification and Verification [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 69 - 76