共 50 条
- [31] A formal model for data storage security evaluation [J]. ICCSA 2007: Proceedings of the Fifth International Conference on Computational Science and Applications, 2007, : 253 - 257
- [32] A Security Formal Model for Multiple Channels Communication [J]. 2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 1425 - 1430
- [34] A formal specification of the MIDP 2.0 security model [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2007, 4691 : 220 - +
- [36] A Formal Approach in Robot Development Process using a UML Model [J]. 2008 10TH INTERNATIONAL CONFERENCE ON CONTROL AUTOMATION ROBOTICS & VISION: ICARV 2008, VOLS 1-4, 2008, : 1888 - 1893
- [37] Formal Verification of Security Protocols Using Spin [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
- [38] Using interface refinement to integrate formal verification into the design cycle [J]. COMPUTER AIDED VERIFICATION, 2004, 3114 : 122 - 134
- [39] Formal verification of an OS submodule [J]. FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, 1998, 1530 : 197 - 208
- [40] Formal Development of Critical Multi-Agent Systems: A Refinement Approach [J]. 2012 NINTH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2012), 2012, : 156 - 161